@unwanted/matrix-sdk-mini 34.12.0 → 34.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/git-revision.txt +1 -1
- package/lib/@types/event.d.ts +0 -19
- package/lib/@types/event.d.ts.map +1 -1
- package/lib/@types/event.js.map +1 -1
- package/lib/@types/global.d.js +0 -2
- package/lib/@types/global.d.js.map +1 -1
- package/lib/autodiscovery.d.ts +1 -1
- package/lib/autodiscovery.d.ts.map +1 -1
- package/lib/autodiscovery.js.map +1 -1
- package/lib/base64.d.ts +3 -6
- package/lib/base64.d.ts.map +1 -1
- package/lib/base64.js +43 -36
- package/lib/base64.js.map +1 -1
- package/lib/browser-index.d.ts.map +1 -1
- package/lib/browser-index.js +0 -11
- package/lib/browser-index.js.map +1 -1
- package/lib/client.d.ts +2 -1298
- package/lib/client.d.ts.map +1 -1
- package/lib/client.js +348 -2967
- package/lib/client.js.map +1 -1
- package/lib/digest.d.ts +2 -2
- package/lib/digest.d.ts.map +1 -1
- package/lib/digest.js +2 -2
- package/lib/digest.js.map +1 -1
- package/lib/embedded.d.ts +0 -22
- package/lib/embedded.d.ts.map +1 -1
- package/lib/embedded.js +58 -168
- package/lib/embedded.js.map +1 -1
- package/lib/event-mapper.d.ts.map +1 -1
- package/lib/event-mapper.js +0 -4
- package/lib/event-mapper.js.map +1 -1
- package/lib/matrix.d.ts +0 -25
- package/lib/matrix.d.ts.map +1 -1
- package/lib/matrix.js +1 -30
- package/lib/matrix.js.map +1 -1
- package/lib/models/MSC3089Branch.d.ts.map +1 -1
- package/lib/models/MSC3089Branch.js +0 -3
- package/lib/models/MSC3089Branch.js.map +1 -1
- package/lib/models/event-timeline-set.d.ts +6 -10
- package/lib/models/event-timeline-set.d.ts.map +1 -1
- package/lib/models/event-timeline-set.js +28 -36
- package/lib/models/event-timeline-set.js.map +1 -1
- package/lib/models/event-timeline.d.ts +7 -2
- package/lib/models/event-timeline.d.ts.map +1 -1
- package/lib/models/event-timeline.js +8 -9
- package/lib/models/event-timeline.js.map +1 -1
- package/lib/models/event.d.ts +1 -95
- package/lib/models/event.d.ts.map +1 -1
- package/lib/models/event.js +11 -281
- package/lib/models/event.js.map +1 -1
- package/lib/models/poll.d.ts.map +1 -1
- package/lib/models/poll.js +1 -5
- package/lib/models/poll.js.map +1 -1
- package/lib/models/relations-container.d.ts.map +1 -1
- package/lib/models/relations-container.js +1 -7
- package/lib/models/relations-container.js.map +1 -1
- package/lib/models/relations.d.ts +0 -1
- package/lib/models/relations.d.ts.map +1 -1
- package/lib/models/relations.js +0 -8
- package/lib/models/relations.js.map +1 -1
- package/lib/models/room-state.d.ts +2 -13
- package/lib/models/room-state.d.ts.map +1 -1
- package/lib/models/room-state.js +12 -56
- package/lib/models/room-state.js.map +1 -1
- package/lib/models/room.d.ts +2 -20
- package/lib/models/room.d.ts.map +1 -1
- package/lib/models/room.js +121 -162
- package/lib/models/room.js.map +1 -1
- package/lib/models/thread.d.ts.map +1 -1
- package/lib/models/thread.js +5 -4
- package/lib/models/thread.js.map +1 -1
- package/lib/sliding-sync-sdk.d.ts +3 -4
- package/lib/sliding-sync-sdk.d.ts.map +1 -1
- package/lib/sliding-sync-sdk.js +55 -102
- package/lib/sliding-sync-sdk.js.map +1 -1
- package/lib/sliding-sync.js +9 -6
- package/lib/sliding-sync.js.map +1 -1
- package/lib/store/indexeddb.d.ts +1 -1
- package/lib/store/indexeddb.d.ts.map +1 -1
- package/lib/store/indexeddb.js.map +1 -1
- package/lib/sync-accumulator.d.ts +6 -4
- package/lib/sync-accumulator.d.ts.map +1 -1
- package/lib/sync-accumulator.js +23 -12
- package/lib/sync-accumulator.js.map +1 -1
- package/lib/sync.d.ts +10 -13
- package/lib/sync.d.ts.map +1 -1
- package/lib/sync.js +94 -115
- package/lib/sync.js.map +1 -1
- package/lib/testing.d.ts +0 -48
- package/lib/testing.d.ts.map +1 -1
- package/lib/testing.js +0 -105
- package/lib/testing.js.map +1 -1
- package/lib/types.d.ts +0 -1
- package/lib/types.d.ts.map +1 -1
- package/lib/types.js.map +1 -1
- package/package.json +10 -11
- package/src/@types/event.ts +2 -36
- package/src/@types/global.d.ts +21 -4
- package/src/autodiscovery.ts +1 -1
- package/src/base64.ts +38 -40
- package/src/browser-index.ts +0 -11
- package/src/client.ts +68 -3087
- package/src/digest.ts +3 -3
- package/src/embedded.ts +38 -134
- package/src/event-mapper.ts +0 -4
- package/src/matrix.ts +0 -41
- package/src/models/MSC3089Branch.ts +0 -3
- package/src/models/event-timeline-set.ts +17 -38
- package/src/models/event-timeline.ts +10 -5
- package/src/models/event.ts +8 -295
- package/src/models/poll.ts +0 -6
- package/src/models/relations-container.ts +1 -8
- package/src/models/relations.ts +0 -8
- package/src/models/room-state.ts +4 -37
- package/src/models/room.ts +18 -68
- package/src/models/thread.ts +4 -3
- package/src/sliding-sync-sdk.ts +10 -83
- package/src/sliding-sync.ts +6 -6
- package/src/store/indexeddb.ts +1 -1
- package/src/sync-accumulator.ts +33 -16
- package/src/sync.ts +112 -143
- package/src/testing.ts +0 -108
- package/src/types.ts +0 -1
- package/CHANGELOG.md +0 -5910
- package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
- package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
- package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
- package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
- package/lib/@types/crypto.d.ts +0 -47
- package/lib/@types/crypto.d.ts.map +0 -1
- package/lib/@types/crypto.js +0 -1
- package/lib/@types/crypto.js.map +0 -1
- package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
- package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
- package/lib/common-crypto/CryptoBackend.d.ts +0 -240
- package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
- package/lib/common-crypto/CryptoBackend.js +0 -73
- package/lib/common-crypto/CryptoBackend.js.map +0 -1
- package/lib/common-crypto/key-passphrase.d.ts +0 -14
- package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
- package/lib/common-crypto/key-passphrase.js +0 -33
- package/lib/common-crypto/key-passphrase.js.map +0 -1
- package/lib/crypto/CrossSigning.d.ts +0 -184
- package/lib/crypto/CrossSigning.d.ts.map +0 -1
- package/lib/crypto/CrossSigning.js +0 -718
- package/lib/crypto/CrossSigning.js.map +0 -1
- package/lib/crypto/DeviceList.d.ts +0 -216
- package/lib/crypto/DeviceList.d.ts.map +0 -1
- package/lib/crypto/DeviceList.js +0 -892
- package/lib/crypto/DeviceList.js.map +0 -1
- package/lib/crypto/EncryptionSetup.d.ts +0 -152
- package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
- package/lib/crypto/EncryptionSetup.js +0 -356
- package/lib/crypto/EncryptionSetup.js.map +0 -1
- package/lib/crypto/OlmDevice.d.ts +0 -457
- package/lib/crypto/OlmDevice.d.ts.map +0 -1
- package/lib/crypto/OlmDevice.js +0 -1241
- package/lib/crypto/OlmDevice.js.map +0 -1
- package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
- package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
- package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
- package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
- package/lib/crypto/RoomList.d.ts +0 -26
- package/lib/crypto/RoomList.d.ts.map +0 -1
- package/lib/crypto/RoomList.js +0 -71
- package/lib/crypto/RoomList.js.map +0 -1
- package/lib/crypto/SecretSharing.d.ts +0 -24
- package/lib/crypto/SecretSharing.d.ts.map +0 -1
- package/lib/crypto/SecretSharing.js +0 -194
- package/lib/crypto/SecretSharing.js.map +0 -1
- package/lib/crypto/SecretStorage.d.ts +0 -55
- package/lib/crypto/SecretStorage.d.ts.map +0 -1
- package/lib/crypto/SecretStorage.js +0 -118
- package/lib/crypto/SecretStorage.js.map +0 -1
- package/lib/crypto/aes.d.ts +0 -6
- package/lib/crypto/aes.d.ts.map +0 -1
- package/lib/crypto/aes.js +0 -24
- package/lib/crypto/aes.js.map +0 -1
- package/lib/crypto/algorithms/base.d.ts +0 -156
- package/lib/crypto/algorithms/base.d.ts.map +0 -1
- package/lib/crypto/algorithms/base.js +0 -187
- package/lib/crypto/algorithms/base.js.map +0 -1
- package/lib/crypto/algorithms/index.d.ts +0 -4
- package/lib/crypto/algorithms/index.d.ts.map +0 -1
- package/lib/crypto/algorithms/index.js +0 -20
- package/lib/crypto/algorithms/index.js.map +0 -1
- package/lib/crypto/algorithms/megolm.d.ts +0 -385
- package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
- package/lib/crypto/algorithms/megolm.js +0 -1822
- package/lib/crypto/algorithms/megolm.js.map +0 -1
- package/lib/crypto/algorithms/olm.d.ts +0 -5
- package/lib/crypto/algorithms/olm.d.ts.map +0 -1
- package/lib/crypto/algorithms/olm.js +0 -299
- package/lib/crypto/algorithms/olm.js.map +0 -1
- package/lib/crypto/api.d.ts +0 -32
- package/lib/crypto/api.d.ts.map +0 -1
- package/lib/crypto/api.js +0 -22
- package/lib/crypto/api.js.map +0 -1
- package/lib/crypto/backup.d.ts +0 -227
- package/lib/crypto/backup.d.ts.map +0 -1
- package/lib/crypto/backup.js +0 -824
- package/lib/crypto/backup.js.map +0 -1
- package/lib/crypto/crypto.d.ts +0 -3
- package/lib/crypto/crypto.d.ts.map +0 -1
- package/lib/crypto/crypto.js +0 -19
- package/lib/crypto/crypto.js.map +0 -1
- package/lib/crypto/dehydration.d.ts +0 -34
- package/lib/crypto/dehydration.d.ts.map +0 -1
- package/lib/crypto/dehydration.js +0 -252
- package/lib/crypto/dehydration.js.map +0 -1
- package/lib/crypto/device-converter.d.ts +0 -9
- package/lib/crypto/device-converter.d.ts.map +0 -1
- package/lib/crypto/device-converter.js +0 -42
- package/lib/crypto/device-converter.js.map +0 -1
- package/lib/crypto/deviceinfo.d.ts +0 -99
- package/lib/crypto/deviceinfo.d.ts.map +0 -1
- package/lib/crypto/deviceinfo.js +0 -148
- package/lib/crypto/deviceinfo.js.map +0 -1
- package/lib/crypto/index.d.ts +0 -1210
- package/lib/crypto/index.d.ts.map +0 -1
- package/lib/crypto/index.js +0 -4101
- package/lib/crypto/index.js.map +0 -1
- package/lib/crypto/key_passphrase.d.ts +0 -14
- package/lib/crypto/key_passphrase.d.ts.map +0 -1
- package/lib/crypto/key_passphrase.js +0 -44
- package/lib/crypto/key_passphrase.js.map +0 -1
- package/lib/crypto/keybackup.d.ts +0 -18
- package/lib/crypto/keybackup.d.ts.map +0 -1
- package/lib/crypto/keybackup.js +0 -1
- package/lib/crypto/keybackup.js.map +0 -1
- package/lib/crypto/olmlib.d.ts +0 -129
- package/lib/crypto/olmlib.d.ts.map +0 -1
- package/lib/crypto/olmlib.js +0 -492
- package/lib/crypto/olmlib.js.map +0 -1
- package/lib/crypto/recoverykey.d.ts +0 -2
- package/lib/crypto/recoverykey.d.ts.map +0 -1
- package/lib/crypto/recoverykey.js +0 -19
- package/lib/crypto/recoverykey.js.map +0 -1
- package/lib/crypto/store/base.d.ts +0 -252
- package/lib/crypto/store/base.d.ts.map +0 -1
- package/lib/crypto/store/base.js +0 -64
- package/lib/crypto/store/base.js.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
- package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
- package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
- package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
- package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
- package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
- package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/localStorage-crypto-store.js +0 -531
- package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
- package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
- package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/memory-crypto-store.js +0 -622
- package/lib/crypto/store/memory-crypto-store.js.map +0 -1
- package/lib/crypto/verification/Base.d.ts +0 -105
- package/lib/crypto/verification/Base.d.ts.map +0 -1
- package/lib/crypto/verification/Base.js +0 -372
- package/lib/crypto/verification/Base.js.map +0 -1
- package/lib/crypto/verification/Error.d.ts +0 -35
- package/lib/crypto/verification/Error.d.ts.map +0 -1
- package/lib/crypto/verification/Error.js +0 -86
- package/lib/crypto/verification/Error.js.map +0 -1
- package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
- package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
- package/lib/crypto/verification/IllegalMethod.js +0 -43
- package/lib/crypto/verification/IllegalMethod.js.map +0 -1
- package/lib/crypto/verification/QRCode.d.ts +0 -51
- package/lib/crypto/verification/QRCode.d.ts.map +0 -1
- package/lib/crypto/verification/QRCode.js +0 -277
- package/lib/crypto/verification/QRCode.js.map +0 -1
- package/lib/crypto/verification/SAS.d.ts +0 -27
- package/lib/crypto/verification/SAS.d.ts.map +0 -1
- package/lib/crypto/verification/SAS.js +0 -485
- package/lib/crypto/verification/SAS.js.map +0 -1
- package/lib/crypto/verification/SASDecimal.d.ts +0 -8
- package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
- package/lib/crypto/verification/SASDecimal.js +0 -34
- package/lib/crypto/verification/SASDecimal.js.map +0 -1
- package/lib/crypto/verification/request/Channel.d.ts +0 -18
- package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
- package/lib/crypto/verification/request/Channel.js +0 -1
- package/lib/crypto/verification/request/Channel.js.map +0 -1
- package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
- package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
- package/lib/crypto/verification/request/InRoomChannel.js +0 -351
- package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
- package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
- package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
- package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
- package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
- package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
- package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
- package/lib/crypto/verification/request/VerificationRequest.js +0 -937
- package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
- package/lib/crypto-api/CryptoEvent.d.ts +0 -69
- package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
- package/lib/crypto-api/CryptoEvent.js +0 -33
- package/lib/crypto-api/CryptoEvent.js.map +0 -1
- package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
- package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
- package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
- package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
- package/lib/crypto-api/index.d.ts +0 -978
- package/lib/crypto-api/index.d.ts.map +0 -1
- package/lib/crypto-api/index.js +0 -304
- package/lib/crypto-api/index.js.map +0 -1
- package/lib/crypto-api/key-passphrase.d.ts +0 -11
- package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
- package/lib/crypto-api/key-passphrase.js +0 -51
- package/lib/crypto-api/key-passphrase.js.map +0 -1
- package/lib/crypto-api/keybackup.d.ts +0 -88
- package/lib/crypto-api/keybackup.d.ts.map +0 -1
- package/lib/crypto-api/keybackup.js +0 -1
- package/lib/crypto-api/keybackup.js.map +0 -1
- package/lib/crypto-api/recovery-key.d.ts +0 -11
- package/lib/crypto-api/recovery-key.d.ts.map +0 -1
- package/lib/crypto-api/recovery-key.js +0 -65
- package/lib/crypto-api/recovery-key.js.map +0 -1
- package/lib/crypto-api/verification.d.ts +0 -344
- package/lib/crypto-api/verification.d.ts.map +0 -1
- package/lib/crypto-api/verification.js +0 -91
- package/lib/crypto-api/verification.js.map +0 -1
- package/lib/matrixrtc/CallMembership.d.ts +0 -66
- package/lib/matrixrtc/CallMembership.d.ts.map +0 -1
- package/lib/matrixrtc/CallMembership.js +0 -197
- package/lib/matrixrtc/CallMembership.js.map +0 -1
- package/lib/matrixrtc/LivekitFocus.d.ts +0 -16
- package/lib/matrixrtc/LivekitFocus.d.ts.map +0 -1
- package/lib/matrixrtc/LivekitFocus.js +0 -20
- package/lib/matrixrtc/LivekitFocus.js.map +0 -1
- package/lib/matrixrtc/MatrixRTCSession.d.ts +0 -295
- package/lib/matrixrtc/MatrixRTCSession.d.ts.map +0 -1
- package/lib/matrixrtc/MatrixRTCSession.js +0 -1043
- package/lib/matrixrtc/MatrixRTCSession.js.map +0 -1
- package/lib/matrixrtc/MatrixRTCSessionManager.d.ts +0 -40
- package/lib/matrixrtc/MatrixRTCSessionManager.d.ts.map +0 -1
- package/lib/matrixrtc/MatrixRTCSessionManager.js +0 -146
- package/lib/matrixrtc/MatrixRTCSessionManager.js.map +0 -1
- package/lib/matrixrtc/focus.d.ts +0 -10
- package/lib/matrixrtc/focus.d.ts.map +0 -1
- package/lib/matrixrtc/focus.js +0 -1
- package/lib/matrixrtc/focus.js.map +0 -1
- package/lib/matrixrtc/index.d.ts +0 -7
- package/lib/matrixrtc/index.d.ts.map +0 -1
- package/lib/matrixrtc/index.js +0 -21
- package/lib/matrixrtc/index.js.map +0 -1
- package/lib/matrixrtc/types.d.ts +0 -19
- package/lib/matrixrtc/types.d.ts.map +0 -1
- package/lib/matrixrtc/types.js +0 -1
- package/lib/matrixrtc/types.js.map +0 -1
- package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
- package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
- package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
- package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
- package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
- package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousChannel.js +0 -1
- package/lib/rendezvous/RendezvousChannel.js.map +0 -1
- package/lib/rendezvous/RendezvousCode.d.ts +0 -9
- package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousCode.js +0 -1
- package/lib/rendezvous/RendezvousCode.js.map +0 -1
- package/lib/rendezvous/RendezvousError.d.ts +0 -6
- package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousError.js +0 -23
- package/lib/rendezvous/RendezvousError.js.map +0 -1
- package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
- package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousFailureReason.js +0 -38
- package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
- package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
- package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousIntent.js +0 -22
- package/lib/rendezvous/RendezvousIntent.js.map +0 -1
- package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
- package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousTransport.js +0 -1
- package/lib/rendezvous/RendezvousTransport.js.map +0 -1
- package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
- package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
- package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
- package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
- package/lib/rendezvous/channels/index.d.ts +0 -2
- package/lib/rendezvous/channels/index.d.ts.map +0 -1
- package/lib/rendezvous/channels/index.js +0 -18
- package/lib/rendezvous/channels/index.js.map +0 -1
- package/lib/rendezvous/index.d.ts +0 -10
- package/lib/rendezvous/index.d.ts.map +0 -1
- package/lib/rendezvous/index.js +0 -23
- package/lib/rendezvous/index.js.map +0 -1
- package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
- package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
- package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
- package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
- package/lib/rendezvous/transports/index.d.ts +0 -2
- package/lib/rendezvous/transports/index.d.ts.map +0 -1
- package/lib/rendezvous/transports/index.js +0 -18
- package/lib/rendezvous/transports/index.js.map +0 -1
- package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
- package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
- package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
- package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
- package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
- package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
- package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
- package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
- package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
- package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
- package/lib/rust-crypto/KeyClaimManager.js +0 -82
- package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
- package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
- package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
- package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
- package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
- package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
- package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
- package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
- package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
- package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
- package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
- package/lib/rust-crypto/RoomEncryptor.js +0 -299
- package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
- package/lib/rust-crypto/backup.d.ts +0 -254
- package/lib/rust-crypto/backup.d.ts.map +0 -1
- package/lib/rust-crypto/backup.js +0 -837
- package/lib/rust-crypto/backup.js.map +0 -1
- package/lib/rust-crypto/constants.d.ts +0 -3
- package/lib/rust-crypto/constants.d.ts.map +0 -1
- package/lib/rust-crypto/constants.js +0 -19
- package/lib/rust-crypto/constants.js.map +0 -1
- package/lib/rust-crypto/device-converter.d.ts +0 -28
- package/lib/rust-crypto/device-converter.d.ts.map +0 -1
- package/lib/rust-crypto/device-converter.js +0 -123
- package/lib/rust-crypto/device-converter.js.map +0 -1
- package/lib/rust-crypto/index.d.ts +0 -61
- package/lib/rust-crypto/index.d.ts.map +0 -1
- package/lib/rust-crypto/index.js +0 -152
- package/lib/rust-crypto/index.js.map +0 -1
- package/lib/rust-crypto/libolm_migration.d.ts +0 -81
- package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
- package/lib/rust-crypto/libolm_migration.js +0 -459
- package/lib/rust-crypto/libolm_migration.js.map +0 -1
- package/lib/rust-crypto/rust-crypto.d.ts +0 -556
- package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
- package/lib/rust-crypto/rust-crypto.js +0 -2016
- package/lib/rust-crypto/rust-crypto.js.map +0 -1
- package/lib/rust-crypto/secret-storage.d.ts +0 -22
- package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
- package/lib/rust-crypto/secret-storage.js +0 -63
- package/lib/rust-crypto/secret-storage.js.map +0 -1
- package/lib/rust-crypto/verification.d.ts +0 -319
- package/lib/rust-crypto/verification.d.ts.map +0 -1
- package/lib/rust-crypto/verification.js +0 -816
- package/lib/rust-crypto/verification.js.map +0 -1
- package/lib/secret-storage.d.ts +0 -370
- package/lib/secret-storage.d.ts.map +0 -1
- package/lib/secret-storage.js +0 -466
- package/lib/secret-storage.js.map +0 -1
- package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
- package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
- package/lib/utils/decryptAESSecretStorageItem.js +0 -50
- package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
- package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
- package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
- package/lib/utils/encryptAESSecretStorageItem.js +0 -68
- package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
- package/lib/utils/internal/deriveKeys.d.ts +0 -10
- package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
- package/lib/utils/internal/deriveKeys.js +0 -60
- package/lib/utils/internal/deriveKeys.js.map +0 -1
- package/lib/webrtc/audioContext.d.ts +0 -15
- package/lib/webrtc/audioContext.d.ts.map +0 -1
- package/lib/webrtc/audioContext.js +0 -46
- package/lib/webrtc/audioContext.js.map +0 -1
- package/lib/webrtc/call.d.ts +0 -560
- package/lib/webrtc/call.d.ts.map +0 -1
- package/lib/webrtc/call.js +0 -2541
- package/lib/webrtc/call.js.map +0 -1
- package/lib/webrtc/callEventHandler.d.ts +0 -37
- package/lib/webrtc/callEventHandler.d.ts.map +0 -1
- package/lib/webrtc/callEventHandler.js +0 -344
- package/lib/webrtc/callEventHandler.js.map +0 -1
- package/lib/webrtc/callEventTypes.d.ts +0 -73
- package/lib/webrtc/callEventTypes.d.ts.map +0 -1
- package/lib/webrtc/callEventTypes.js +0 -13
- package/lib/webrtc/callEventTypes.js.map +0 -1
- package/lib/webrtc/callFeed.d.ts +0 -128
- package/lib/webrtc/callFeed.d.ts.map +0 -1
- package/lib/webrtc/callFeed.js +0 -289
- package/lib/webrtc/callFeed.js.map +0 -1
- package/lib/webrtc/groupCall.d.ts +0 -323
- package/lib/webrtc/groupCall.d.ts.map +0 -1
- package/lib/webrtc/groupCall.js +0 -1337
- package/lib/webrtc/groupCall.js.map +0 -1
- package/lib/webrtc/groupCallEventHandler.d.ts +0 -31
- package/lib/webrtc/groupCallEventHandler.d.ts.map +0 -1
- package/lib/webrtc/groupCallEventHandler.js +0 -178
- package/lib/webrtc/groupCallEventHandler.js.map +0 -1
- package/lib/webrtc/mediaHandler.d.ts +0 -89
- package/lib/webrtc/mediaHandler.d.ts.map +0 -1
- package/lib/webrtc/mediaHandler.js +0 -437
- package/lib/webrtc/mediaHandler.js.map +0 -1
- package/lib/webrtc/stats/callFeedStatsReporter.d.ts +0 -8
- package/lib/webrtc/stats/callFeedStatsReporter.d.ts.map +0 -1
- package/lib/webrtc/stats/callFeedStatsReporter.js +0 -82
- package/lib/webrtc/stats/callFeedStatsReporter.js.map +0 -1
- package/lib/webrtc/stats/callStatsReportGatherer.d.ts +0 -25
- package/lib/webrtc/stats/callStatsReportGatherer.d.ts.map +0 -1
- package/lib/webrtc/stats/callStatsReportGatherer.js +0 -199
- package/lib/webrtc/stats/callStatsReportGatherer.js.map +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.d.ts +0 -17
- package/lib/webrtc/stats/callStatsReportSummary.d.ts.map +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.js +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.js.map +0 -1
- package/lib/webrtc/stats/connectionStats.d.ts +0 -28
- package/lib/webrtc/stats/connectionStats.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStats.js +0 -26
- package/lib/webrtc/stats/connectionStats.js.map +0 -1
- package/lib/webrtc/stats/connectionStatsBuilder.d.ts +0 -5
- package/lib/webrtc/stats/connectionStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStatsBuilder.js +0 -27
- package/lib/webrtc/stats/connectionStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts +0 -7
- package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStatsReportBuilder.js +0 -121
- package/lib/webrtc/stats/connectionStatsReportBuilder.js.map +0 -1
- package/lib/webrtc/stats/groupCallStats.d.ts +0 -22
- package/lib/webrtc/stats/groupCallStats.d.ts.map +0 -1
- package/lib/webrtc/stats/groupCallStats.js +0 -78
- package/lib/webrtc/stats/groupCallStats.js.map +0 -1
- package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts +0 -10
- package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaSsrcHandler.js +0 -57
- package/lib/webrtc/stats/media/mediaSsrcHandler.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackHandler.d.ts +0 -12
- package/lib/webrtc/stats/media/mediaTrackHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackHandler.js +0 -62
- package/lib/webrtc/stats/media/mediaTrackHandler.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStats.d.ts +0 -86
- package/lib/webrtc/stats/media/mediaTrackStats.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStats.js +0 -142
- package/lib/webrtc/stats/media/mediaTrackStats.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts +0 -22
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.js +0 -76
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.js.map +0 -1
- package/lib/webrtc/stats/statsReport.d.ts +0 -99
- package/lib/webrtc/stats/statsReport.d.ts.map +0 -1
- package/lib/webrtc/stats/statsReport.js +0 -32
- package/lib/webrtc/stats/statsReport.js.map +0 -1
- package/lib/webrtc/stats/statsReportEmitter.d.ts +0 -15
- package/lib/webrtc/stats/statsReportEmitter.d.ts.map +0 -1
- package/lib/webrtc/stats/statsReportEmitter.js +0 -33
- package/lib/webrtc/stats/statsReportEmitter.js.map +0 -1
- package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts +0 -16
- package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts.map +0 -1
- package/lib/webrtc/stats/summaryStatsReportGatherer.js +0 -116
- package/lib/webrtc/stats/summaryStatsReportGatherer.js.map +0 -1
- package/lib/webrtc/stats/trackStatsBuilder.d.ts +0 -19
- package/lib/webrtc/stats/trackStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/trackStatsBuilder.js +0 -168
- package/lib/webrtc/stats/trackStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/transportStats.d.ts +0 -11
- package/lib/webrtc/stats/transportStats.d.ts.map +0 -1
- package/lib/webrtc/stats/transportStats.js +0 -1
- package/lib/webrtc/stats/transportStats.js.map +0 -1
- package/lib/webrtc/stats/transportStatsBuilder.d.ts +0 -5
- package/lib/webrtc/stats/transportStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/transportStatsBuilder.js +0 -34
- package/lib/webrtc/stats/transportStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/valueFormatter.d.ts +0 -4
- package/lib/webrtc/stats/valueFormatter.d.ts.map +0 -1
- package/lib/webrtc/stats/valueFormatter.js +0 -25
- package/lib/webrtc/stats/valueFormatter.js.map +0 -1
- package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
- package/src/@types/crypto.ts +0 -73
- package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
- package/src/common-crypto/CryptoBackend.ts +0 -302
- package/src/common-crypto/README.md +0 -4
- package/src/common-crypto/key-passphrase.ts +0 -43
- package/src/crypto/CrossSigning.ts +0 -773
- package/src/crypto/DeviceList.ts +0 -989
- package/src/crypto/EncryptionSetup.ts +0 -351
- package/src/crypto/OlmDevice.ts +0 -1500
- package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
- package/src/crypto/RoomList.ts +0 -70
- package/src/crypto/SecretSharing.ts +0 -240
- package/src/crypto/SecretStorage.ts +0 -136
- package/src/crypto/aes.ts +0 -23
- package/src/crypto/algorithms/base.ts +0 -236
- package/src/crypto/algorithms/index.ts +0 -20
- package/src/crypto/algorithms/megolm.ts +0 -2216
- package/src/crypto/algorithms/olm.ts +0 -381
- package/src/crypto/api.ts +0 -70
- package/src/crypto/backup.ts +0 -922
- package/src/crypto/crypto.ts +0 -18
- package/src/crypto/dehydration.ts +0 -272
- package/src/crypto/device-converter.ts +0 -45
- package/src/crypto/deviceinfo.ts +0 -158
- package/src/crypto/index.ts +0 -4418
- package/src/crypto/key_passphrase.ts +0 -42
- package/src/crypto/keybackup.ts +0 -47
- package/src/crypto/olmlib.ts +0 -539
- package/src/crypto/recoverykey.ts +0 -18
- package/src/crypto/store/base.ts +0 -348
- package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
- package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
- package/src/crypto/store/localStorage-crypto-store.ts +0 -579
- package/src/crypto/store/memory-crypto-store.ts +0 -680
- package/src/crypto/verification/Base.ts +0 -409
- package/src/crypto/verification/Error.ts +0 -76
- package/src/crypto/verification/IllegalMethod.ts +0 -50
- package/src/crypto/verification/QRCode.ts +0 -310
- package/src/crypto/verification/SAS.ts +0 -494
- package/src/crypto/verification/SASDecimal.ts +0 -37
- package/src/crypto/verification/request/Channel.ts +0 -34
- package/src/crypto/verification/request/InRoomChannel.ts +0 -371
- package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
- package/src/crypto/verification/request/VerificationRequest.ts +0 -976
- package/src/crypto-api/CryptoEvent.ts +0 -93
- package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
- package/src/crypto-api/index.ts +0 -1175
- package/src/crypto-api/key-passphrase.ts +0 -58
- package/src/crypto-api/keybackup.ts +0 -115
- package/src/crypto-api/recovery-key.ts +0 -69
- package/src/crypto-api/verification.ts +0 -408
- package/src/matrixrtc/CallMembership.ts +0 -247
- package/src/matrixrtc/LivekitFocus.ts +0 -39
- package/src/matrixrtc/MatrixRTCSession.ts +0 -1319
- package/src/matrixrtc/MatrixRTCSessionManager.ts +0 -166
- package/src/matrixrtc/focus.ts +0 -25
- package/src/matrixrtc/index.ts +0 -22
- package/src/matrixrtc/types.ts +0 -36
- package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
- package/src/rendezvous/RendezvousChannel.ts +0 -48
- package/src/rendezvous/RendezvousCode.ts +0 -25
- package/src/rendezvous/RendezvousError.ts +0 -26
- package/src/rendezvous/RendezvousFailureReason.ts +0 -49
- package/src/rendezvous/RendezvousIntent.ts +0 -20
- package/src/rendezvous/RendezvousTransport.ts +0 -58
- package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
- package/src/rendezvous/channels/index.ts +0 -17
- package/src/rendezvous/index.ts +0 -25
- package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
- package/src/rendezvous/transports/index.ts +0 -17
- package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
- package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
- package/src/rust-crypto/KeyClaimManager.ts +0 -86
- package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
- package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
- package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
- package/src/rust-crypto/RoomEncryptor.ts +0 -352
- package/src/rust-crypto/backup.ts +0 -881
- package/src/rust-crypto/constants.ts +0 -18
- package/src/rust-crypto/device-converter.ts +0 -128
- package/src/rust-crypto/index.ts +0 -237
- package/src/rust-crypto/libolm_migration.ts +0 -530
- package/src/rust-crypto/rust-crypto.ts +0 -2205
- package/src/rust-crypto/secret-storage.ts +0 -60
- package/src/rust-crypto/verification.ts +0 -830
- package/src/secret-storage.ts +0 -693
- package/src/utils/decryptAESSecretStorageItem.ts +0 -54
- package/src/utils/encryptAESSecretStorageItem.ts +0 -73
- package/src/utils/internal/deriveKeys.ts +0 -63
- package/src/webrtc/audioContext.ts +0 -44
- package/src/webrtc/call.ts +0 -3074
- package/src/webrtc/callEventHandler.ts +0 -425
- package/src/webrtc/callEventTypes.ts +0 -93
- package/src/webrtc/callFeed.ts +0 -364
- package/src/webrtc/groupCall.ts +0 -1735
- package/src/webrtc/groupCallEventHandler.ts +0 -234
- package/src/webrtc/mediaHandler.ts +0 -484
- package/src/webrtc/stats/callFeedStatsReporter.ts +0 -94
- package/src/webrtc/stats/callStatsReportGatherer.ts +0 -219
- package/src/webrtc/stats/callStatsReportSummary.ts +0 -30
- package/src/webrtc/stats/connectionStats.ts +0 -47
- package/src/webrtc/stats/connectionStatsBuilder.ts +0 -28
- package/src/webrtc/stats/connectionStatsReportBuilder.ts +0 -140
- package/src/webrtc/stats/groupCallStats.ts +0 -93
- package/src/webrtc/stats/media/mediaSsrcHandler.ts +0 -57
- package/src/webrtc/stats/media/mediaTrackHandler.ts +0 -76
- package/src/webrtc/stats/media/mediaTrackStats.ts +0 -176
- package/src/webrtc/stats/media/mediaTrackStatsHandler.ts +0 -90
- package/src/webrtc/stats/statsReport.ts +0 -133
- package/src/webrtc/stats/statsReportEmitter.ts +0 -49
- package/src/webrtc/stats/summaryStatsReportGatherer.ts +0 -148
- package/src/webrtc/stats/trackStatsBuilder.ts +0 -207
- package/src/webrtc/stats/transportStats.ts +0 -26
- package/src/webrtc/stats/transportStatsBuilder.ts +0 -48
- package/src/webrtc/stats/valueFormatter.ts +0 -27
package/lib/crypto/index.d.ts
DELETED
@@ -1,1210 +0,0 @@
|
|
1
|
-
import type { IEventDecryptionResult, IMegolmSessionData } from "../@types/crypto.ts";
|
2
|
-
import { ToDeviceMessageId } from "../@types/event.ts";
|
3
|
-
import { IExportedDevice, OlmDevice } from "./OlmDevice.ts";
|
4
|
-
import { IOlmDevice } from "./algorithms/megolm.ts";
|
5
|
-
import * as olmlib from "./olmlib.ts";
|
6
|
-
import { DeviceInfoMap, DeviceList } from "./DeviceList.ts";
|
7
|
-
import { DeviceInfo } from "./deviceinfo.ts";
|
8
|
-
import type { DecryptionAlgorithm } from "./algorithms/index.ts";
|
9
|
-
import { CrossSigningInfo, DeviceTrustLevel, UserTrustLevel } from "./CrossSigning.ts";
|
10
|
-
import { SecretStorage as LegacySecretStorage } from "./SecretStorage.ts";
|
11
|
-
import { CrossSigningKey, ICreateSecretStorageOpts, IEncryptedEventInfo, IRecoveryKey } from "./api.ts";
|
12
|
-
import { VerificationBase } from "./verification/Base.ts";
|
13
|
-
import { VerificationRequest } from "./verification/request/VerificationRequest.ts";
|
14
|
-
import { InRoomRequests } from "./verification/request/InRoomChannel.ts";
|
15
|
-
import { DehydrationManager } from "./dehydration.ts";
|
16
|
-
import { BackupManager } from "./backup.ts";
|
17
|
-
import { IStore } from "../store/index.ts";
|
18
|
-
import { Room, RoomEvent } from "../models/room.ts";
|
19
|
-
import { RoomMemberEvent } from "../models/room-member.ts";
|
20
|
-
import { MatrixEvent, MatrixEventEvent } from "../models/event.ts";
|
21
|
-
import { ToDeviceBatch, ToDevicePayload } from "../models/ToDeviceMessage.ts";
|
22
|
-
import { ClientEvent, IKeysUploadResponse, IUploadKeySignaturesResponse, MatrixClient } from "../client.ts";
|
23
|
-
import { IRoomEncryption } from "./RoomList.ts";
|
24
|
-
import { ISyncStateData } from "../sync.ts";
|
25
|
-
import { CryptoStore } from "./store/base.ts";
|
26
|
-
import { IVerificationChannel } from "./verification/request/Channel.ts";
|
27
|
-
import { TypedEventEmitter } from "../models/typed-event-emitter.ts";
|
28
|
-
import { IDeviceLists, IToDeviceEvent } from "../sync-accumulator.ts";
|
29
|
-
import { ISignatures } from "../@types/signed.ts";
|
30
|
-
import { IMessage } from "./algorithms/olm.ts";
|
31
|
-
import { BackupDecryptor, CryptoBackend, OnSyncCompletedData } from "../common-crypto/CryptoBackend.ts";
|
32
|
-
import { AddSecretStorageKeyOpts, SecretStorageKeyDescription, SecretStorageKeyObject, SecretStorageKeyTuple } from "../secret-storage.ts";
|
33
|
-
import { ISecretRequest } from "./SecretSharing.ts";
|
34
|
-
import { BackupTrustInfo, BootstrapCrossSigningOpts, CrossSigningKeyInfo, CrossSigningStatus, DeviceIsolationMode, DeviceVerificationStatus, EventEncryptionInfo, ImportRoomKeysOpts, KeyBackupCheck, KeyBackupInfo, OwnDeviceKeys, CryptoEventHandlerMap as CryptoApiCryptoEventHandlerMap, KeyBackupRestoreResult, KeyBackupRestoreOpts } from "../crypto-api/index.ts";
|
35
|
-
import { DeviceMap } from "../models/device.ts";
|
36
|
-
export type { BootstrapCrossSigningOpts as IBootstrapCrossSigningOpts, CryptoCallbacks as ICryptoCallbacks, } from "../crypto-api/index.ts";
|
37
|
-
/**
|
38
|
-
* verification method names
|
39
|
-
*/
|
40
|
-
export declare const verificationMethods: {
|
41
|
-
readonly RECIPROCATE_QR_CODE: string;
|
42
|
-
readonly SAS: string;
|
43
|
-
};
|
44
|
-
export type VerificationMethod = keyof typeof verificationMethods | string;
|
45
|
-
export declare function isCryptoAvailable(): boolean;
|
46
|
-
interface IInitOpts {
|
47
|
-
exportedOlmDevice?: IExportedDevice;
|
48
|
-
pickleKey?: string;
|
49
|
-
}
|
50
|
-
interface IRoomKey {
|
51
|
-
room_id: string;
|
52
|
-
algorithm: string;
|
53
|
-
}
|
54
|
-
/**
|
55
|
-
* The parameters of a room key request. The details of the request may
|
56
|
-
* vary with the crypto algorithm, but the management and storage layers for
|
57
|
-
* outgoing requests expect it to have 'room_id' and 'session_id' properties.
|
58
|
-
*/
|
59
|
-
export interface IRoomKeyRequestBody extends IRoomKey {
|
60
|
-
session_id: string;
|
61
|
-
sender_key: string;
|
62
|
-
}
|
63
|
-
export interface ICheckOwnCrossSigningTrustOpts {
|
64
|
-
allowPrivateKeyRequests?: boolean;
|
65
|
-
}
|
66
|
-
interface IUserOlmSession {
|
67
|
-
deviceIdKey: string;
|
68
|
-
sessions: {
|
69
|
-
sessionId: string;
|
70
|
-
hasReceivedMessage: boolean;
|
71
|
-
}[];
|
72
|
-
}
|
73
|
-
export interface IRoomKeyRequestRecipient {
|
74
|
-
userId: string;
|
75
|
-
deviceId: string;
|
76
|
-
}
|
77
|
-
interface ISignableObject {
|
78
|
-
signatures?: ISignatures;
|
79
|
-
unsigned?: object;
|
80
|
-
}
|
81
|
-
export interface IRequestsMap {
|
82
|
-
getRequest(event: MatrixEvent): VerificationRequest | undefined;
|
83
|
-
getRequestByChannel(channel: IVerificationChannel): VerificationRequest | undefined;
|
84
|
-
setRequest(event: MatrixEvent, request: VerificationRequest): void;
|
85
|
-
setRequestByChannel(channel: IVerificationChannel, request: VerificationRequest): void;
|
86
|
-
}
|
87
|
-
export interface IOlmEncryptedContent {
|
88
|
-
algorithm: typeof olmlib.OLM_ALGORITHM;
|
89
|
-
sender_key: string;
|
90
|
-
ciphertext: Record<string, IMessage>;
|
91
|
-
[ToDeviceMessageId]?: string;
|
92
|
-
}
|
93
|
-
export interface IMegolmEncryptedContent {
|
94
|
-
algorithm: typeof olmlib.MEGOLM_ALGORITHM;
|
95
|
-
sender_key: string;
|
96
|
-
session_id: string;
|
97
|
-
device_id: string;
|
98
|
-
ciphertext: string;
|
99
|
-
[ToDeviceMessageId]?: string;
|
100
|
-
}
|
101
|
-
export type IEncryptedContent = IOlmEncryptedContent | IMegolmEncryptedContent;
|
102
|
-
export declare enum CryptoEvent {
|
103
|
-
/** @deprecated Event not fired by the rust crypto */
|
104
|
-
DeviceVerificationChanged = "deviceVerificationChanged",
|
105
|
-
UserTrustStatusChanged = "userTrustStatusChanged",
|
106
|
-
/** @deprecated Event not fired by the rust crypto */
|
107
|
-
UserCrossSigningUpdated = "userCrossSigningUpdated",
|
108
|
-
/** @deprecated Event not fired by the rust crypto */
|
109
|
-
RoomKeyRequest = "crypto.roomKeyRequest",
|
110
|
-
/** @deprecated Event not fired by the rust crypto */
|
111
|
-
RoomKeyRequestCancellation = "crypto.roomKeyRequestCancellation",
|
112
|
-
KeyBackupStatus = "crypto.keyBackupStatus",
|
113
|
-
KeyBackupFailed = "crypto.keyBackupFailed",
|
114
|
-
KeyBackupSessionsRemaining = "crypto.keyBackupSessionsRemaining",
|
115
|
-
/**
|
116
|
-
* Fires when a new valid backup decryption key is in cache.
|
117
|
-
* This will happen when a secret is received from another session, from secret storage,
|
118
|
-
* or when a new backup is created from this session.
|
119
|
-
*
|
120
|
-
* The payload is the version of the backup for which we have the key for.
|
121
|
-
*
|
122
|
-
* This event is only fired by the rust crypto backend.
|
123
|
-
*/
|
124
|
-
KeyBackupDecryptionKeyCached = "crypto.keyBackupDecryptionKeyCached",
|
125
|
-
/** @deprecated Event not fired by the rust crypto */
|
126
|
-
KeySignatureUploadFailure = "crypto.keySignatureUploadFailure",
|
127
|
-
/** @deprecated Use `VerificationRequestReceived`. */
|
128
|
-
VerificationRequest = "crypto.verification.request",
|
129
|
-
/**
|
130
|
-
* Fires when a key verification request is received.
|
131
|
-
*
|
132
|
-
* The payload is a {@link Crypto.VerificationRequest}.
|
133
|
-
*/
|
134
|
-
VerificationRequestReceived = "crypto.verificationRequestReceived",
|
135
|
-
/** @deprecated Event not fired by the rust crypto */
|
136
|
-
Warning = "crypto.warning",
|
137
|
-
/** @deprecated Use {@link DevicesUpdated} instead when using rust crypto */
|
138
|
-
WillUpdateDevices = "crypto.willUpdateDevices",
|
139
|
-
DevicesUpdated = "crypto.devicesUpdated",
|
140
|
-
KeysChanged = "crossSigning.keysChanged",
|
141
|
-
/**
|
142
|
-
* Fires when data is being migrated from legacy crypto to rust crypto.
|
143
|
-
*
|
144
|
-
* The payload is a pair `(progress, total)`, where `progress` is the number of steps completed so far, and
|
145
|
-
* `total` is the total number of steps. When migration is complete, a final instance of the event is emitted, with
|
146
|
-
* `progress === total === -1`.
|
147
|
-
*/
|
148
|
-
LegacyCryptoStoreMigrationProgress = "crypto.legacyCryptoStoreMigrationProgress"
|
149
|
-
}
|
150
|
-
export type CryptoEventHandlerMap = CryptoApiCryptoEventHandlerMap & {
|
151
|
-
/**
|
152
|
-
* Fires when a device is marked as verified/unverified/blocked/unblocked by
|
153
|
-
* {@link MatrixClient#setDeviceVerified | MatrixClient.setDeviceVerified} or
|
154
|
-
* {@link MatrixClient#setDeviceBlocked | MatrixClient.setDeviceBlocked}.
|
155
|
-
*
|
156
|
-
* @param userId - the owner of the verified device
|
157
|
-
* @param deviceId - the id of the verified device
|
158
|
-
* @param deviceInfo - updated device information
|
159
|
-
*/
|
160
|
-
[CryptoEvent.DeviceVerificationChanged]: (userId: string, deviceId: string, deviceInfo: DeviceInfo) => void;
|
161
|
-
/**
|
162
|
-
* Fires when we receive a room key request
|
163
|
-
*
|
164
|
-
* @param request - request details
|
165
|
-
*/
|
166
|
-
[CryptoEvent.RoomKeyRequest]: (request: IncomingRoomKeyRequest) => void;
|
167
|
-
/**
|
168
|
-
* Fires when we receive a room key request cancellation
|
169
|
-
*/
|
170
|
-
[CryptoEvent.RoomKeyRequestCancellation]: (request: IncomingRoomKeyRequestCancellation) => void;
|
171
|
-
[CryptoEvent.KeySignatureUploadFailure]: (failures: IUploadKeySignaturesResponse["failures"], source: "checkOwnCrossSigningTrust" | "afterCrossSigningLocalKeyChange" | "setDeviceVerification", upload: (opts: {
|
172
|
-
shouldEmit: boolean;
|
173
|
-
}) => Promise<void>) => void;
|
174
|
-
/**
|
175
|
-
* Fires when a key verification is requested.
|
176
|
-
*
|
177
|
-
* Deprecated: use `CryptoEvent.VerificationRequestReceived`.
|
178
|
-
*/
|
179
|
-
[CryptoEvent.VerificationRequest]: (request: VerificationRequest<any>) => void;
|
180
|
-
/**
|
181
|
-
* Fires when the app may wish to warn the user about something related
|
182
|
-
* the end-to-end crypto.
|
183
|
-
*
|
184
|
-
* @param type - One of the strings listed above
|
185
|
-
*/
|
186
|
-
[CryptoEvent.Warning]: (type: string) => void;
|
187
|
-
[CryptoEvent.UserCrossSigningUpdated]: (userId: string) => void;
|
188
|
-
[CryptoEvent.LegacyCryptoStoreMigrationProgress]: (progress: number, total: number) => void;
|
189
|
-
};
|
190
|
-
export declare class Crypto extends TypedEventEmitter<CryptoEvent, CryptoEventHandlerMap> implements CryptoBackend {
|
191
|
-
readonly baseApis: MatrixClient;
|
192
|
-
readonly userId: string;
|
193
|
-
private readonly deviceId;
|
194
|
-
private readonly clientStore;
|
195
|
-
readonly cryptoStore: CryptoStore;
|
196
|
-
/**
|
197
|
-
* @returns The version of Olm.
|
198
|
-
*/
|
199
|
-
static getOlmVersion(): [number, number, number];
|
200
|
-
readonly backupManager: BackupManager;
|
201
|
-
readonly crossSigningInfo: CrossSigningInfo;
|
202
|
-
readonly olmDevice: OlmDevice;
|
203
|
-
readonly deviceList: DeviceList;
|
204
|
-
readonly dehydrationManager: DehydrationManager;
|
205
|
-
readonly secretStorage: LegacySecretStorage;
|
206
|
-
private readonly roomList;
|
207
|
-
private readonly reEmitter;
|
208
|
-
private readonly verificationMethods;
|
209
|
-
readonly supportedAlgorithms: string[];
|
210
|
-
private readonly outgoingRoomKeyRequestManager;
|
211
|
-
private readonly toDeviceVerificationRequests;
|
212
|
-
readonly inRoomVerificationRequests: InRoomRequests;
|
213
|
-
private trustCrossSignedDevices;
|
214
|
-
private lastOneTimeKeyCheck;
|
215
|
-
private oneTimeKeyCheckInProgress;
|
216
|
-
private roomEncryptors;
|
217
|
-
private roomDecryptors;
|
218
|
-
private deviceKeys;
|
219
|
-
globalBlacklistUnverifiedDevices: boolean;
|
220
|
-
globalErrorOnUnknownDevices: boolean;
|
221
|
-
private receivedRoomKeyRequests;
|
222
|
-
private receivedRoomKeyRequestCancellations;
|
223
|
-
private processingRoomKeyRequests;
|
224
|
-
private lazyLoadMembers;
|
225
|
-
private roomDeviceTrackingState;
|
226
|
-
private forceNewSessionRetryTime;
|
227
|
-
private sendKeyRequestsImmediately;
|
228
|
-
private oneTimeKeyCount?;
|
229
|
-
private needsNewFallback?;
|
230
|
-
private fallbackCleanup?;
|
231
|
-
/**
|
232
|
-
* Cryptography bits
|
233
|
-
*
|
234
|
-
* This module is internal to the js-sdk; the public API is via MatrixClient.
|
235
|
-
*
|
236
|
-
* @internal
|
237
|
-
*
|
238
|
-
* @param baseApis - base matrix api interface
|
239
|
-
*
|
240
|
-
* @param userId - The user ID for the local user
|
241
|
-
*
|
242
|
-
* @param deviceId - The identifier for this device.
|
243
|
-
*
|
244
|
-
* @param clientStore - the MatrixClient data store.
|
245
|
-
*
|
246
|
-
* @param cryptoStore - storage for the crypto layer.
|
247
|
-
*
|
248
|
-
* @param verificationMethods - Array of verification methods to use.
|
249
|
-
* Each element can either be a string from MatrixClient.verificationMethods
|
250
|
-
* or a class that implements a verification method.
|
251
|
-
*/
|
252
|
-
constructor(baseApis: MatrixClient, userId: string, deviceId: string, clientStore: IStore, cryptoStore: CryptoStore, verificationMethods: Array<VerificationMethod | (typeof VerificationBase & {
|
253
|
-
NAME: string;
|
254
|
-
})>);
|
255
|
-
/**
|
256
|
-
* Initialise the crypto module so that it is ready for use
|
257
|
-
*
|
258
|
-
* Returns a promise which resolves once the crypto module is ready for use.
|
259
|
-
*
|
260
|
-
* @param exportedOlmDevice - (Optional) data from exported device
|
261
|
-
* that must be re-created.
|
262
|
-
*/
|
263
|
-
init({ exportedOlmDevice, pickleKey }?: IInitOpts): Promise<void>;
|
264
|
-
/**
|
265
|
-
* Implementation of {@link Crypto.CryptoApi#setDeviceIsolationMode}.
|
266
|
-
*/
|
267
|
-
setDeviceIsolationMode(isolationMode: DeviceIsolationMode): void;
|
268
|
-
/**
|
269
|
-
* Implementation of {@link Crypto.CryptoApi#getVersion}.
|
270
|
-
*/
|
271
|
-
getVersion(): string;
|
272
|
-
/**
|
273
|
-
* Whether to trust a others users signatures of their devices.
|
274
|
-
* If false, devices will only be considered 'verified' if we have
|
275
|
-
* verified that device individually (effectively disabling cross-signing).
|
276
|
-
*
|
277
|
-
* Default: true
|
278
|
-
*
|
279
|
-
* @returns True if trusting cross-signed devices
|
280
|
-
*/
|
281
|
-
getTrustCrossSignedDevices(): boolean;
|
282
|
-
/**
|
283
|
-
* @deprecated Use {@link Crypto.CryptoApi#getTrustCrossSignedDevices}.
|
284
|
-
*/
|
285
|
-
getCryptoTrustCrossSignedDevices(): boolean;
|
286
|
-
/**
|
287
|
-
* See getCryptoTrustCrossSignedDevices
|
288
|
-
*
|
289
|
-
* @param val - True to trust cross-signed devices
|
290
|
-
*/
|
291
|
-
setTrustCrossSignedDevices(val: boolean): void;
|
292
|
-
/**
|
293
|
-
* @deprecated Use {@link Crypto.CryptoApi#setTrustCrossSignedDevices}.
|
294
|
-
*/
|
295
|
-
setCryptoTrustCrossSignedDevices(val: boolean): void;
|
296
|
-
/**
|
297
|
-
* Create a recovery key from a user-supplied passphrase.
|
298
|
-
*
|
299
|
-
* @param password - Passphrase string that can be entered by the user
|
300
|
-
* when restoring the backup as an alternative to entering the recovery key.
|
301
|
-
* Optional.
|
302
|
-
* @returns Object with public key metadata, encoded private
|
303
|
-
* recovery key which should be disposed of after displaying to the user,
|
304
|
-
* and raw private key to avoid round tripping if needed.
|
305
|
-
*/
|
306
|
-
createRecoveryKeyFromPassphrase(password?: string): Promise<IRecoveryKey>;
|
307
|
-
/**
|
308
|
-
* Checks if the user has previously published cross-signing keys
|
309
|
-
*
|
310
|
-
* This means downloading the devicelist for the user and checking if the list includes
|
311
|
-
* the cross-signing pseudo-device.
|
312
|
-
*
|
313
|
-
* @internal
|
314
|
-
*/
|
315
|
-
userHasCrossSigningKeys(userId?: string): Promise<boolean>;
|
316
|
-
/**
|
317
|
-
* Checks whether cross signing:
|
318
|
-
* - is enabled on this account and trusted by this device
|
319
|
-
* - has private keys either cached locally or stored in secret storage
|
320
|
-
*
|
321
|
-
* If this function returns false, bootstrapCrossSigning() can be used
|
322
|
-
* to fix things such that it returns true. That is to say, after
|
323
|
-
* bootstrapCrossSigning() completes successfully, this function should
|
324
|
-
* return true.
|
325
|
-
*
|
326
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
327
|
-
*
|
328
|
-
* @returns True if cross-signing is ready to be used on this device
|
329
|
-
*/
|
330
|
-
isCrossSigningReady(): Promise<boolean>;
|
331
|
-
/**
|
332
|
-
* Checks whether secret storage:
|
333
|
-
* - is enabled on this account
|
334
|
-
* - is storing cross-signing private keys
|
335
|
-
* - is storing session backup key (if enabled)
|
336
|
-
*
|
337
|
-
* If this function returns false, bootstrapSecretStorage() can be used
|
338
|
-
* to fix things such that it returns true. That is to say, after
|
339
|
-
* bootstrapSecretStorage() completes successfully, this function should
|
340
|
-
* return true.
|
341
|
-
*
|
342
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
343
|
-
*
|
344
|
-
* @returns True if secret storage is ready to be used on this device
|
345
|
-
*/
|
346
|
-
isSecretStorageReady(): Promise<boolean>;
|
347
|
-
/**
|
348
|
-
* Implementation of {@link Crypto.CryptoApi#getCrossSigningStatus}
|
349
|
-
*/
|
350
|
-
getCrossSigningStatus(): Promise<CrossSigningStatus>;
|
351
|
-
/**
|
352
|
-
* Bootstrap cross-signing by creating keys if needed. If everything is already
|
353
|
-
* set up, then no changes are made, so this is safe to run to ensure
|
354
|
-
* cross-signing is ready for use.
|
355
|
-
*
|
356
|
-
* This function:
|
357
|
-
* - creates new cross-signing keys if they are not found locally cached nor in
|
358
|
-
* secret storage (if it has been setup)
|
359
|
-
*
|
360
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
361
|
-
*/
|
362
|
-
bootstrapCrossSigning({ authUploadDeviceSigningKeys, setupNewCrossSigning, }?: BootstrapCrossSigningOpts): Promise<void>;
|
363
|
-
/**
|
364
|
-
* Bootstrap Secure Secret Storage if needed by creating a default key. If everything is
|
365
|
-
* already set up, then no changes are made, so this is safe to run to ensure secret
|
366
|
-
* storage is ready for use.
|
367
|
-
*
|
368
|
-
* This function
|
369
|
-
* - creates a new Secure Secret Storage key if no default key exists
|
370
|
-
* - if a key backup exists, it is migrated to store the key in the Secret
|
371
|
-
* Storage
|
372
|
-
* - creates a backup if none exists, and one is requested
|
373
|
-
* - migrates Secure Secret Storage to use the latest algorithm, if an outdated
|
374
|
-
* algorithm is found
|
375
|
-
*
|
376
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
377
|
-
*
|
378
|
-
* Returns:
|
379
|
-
* A promise which resolves to key creation data for
|
380
|
-
* SecretStorage#addKey: an object with `passphrase` etc fields.
|
381
|
-
*/
|
382
|
-
bootstrapSecretStorage({ createSecretStorageKey, keyBackupInfo, setupNewKeyBackup, setupNewSecretStorage, getKeyBackupPassphrase, }?: ICreateSecretStorageOpts): Promise<void>;
|
383
|
-
/**
|
384
|
-
* Implementation of {@link Crypto.CryptoApi#resetKeyBackup}.
|
385
|
-
*/
|
386
|
-
resetKeyBackup(): Promise<void>;
|
387
|
-
/**
|
388
|
-
* Implementation of {@link Crypto.CryptoApi#deleteKeyBackupVersion}.
|
389
|
-
*/
|
390
|
-
deleteKeyBackupVersion(version: string): Promise<void>;
|
391
|
-
/**
|
392
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#addKey}.
|
393
|
-
*/
|
394
|
-
addSecretStorageKey(algorithm: string, opts: AddSecretStorageKeyOpts, keyID?: string): Promise<SecretStorageKeyObject>;
|
395
|
-
/**
|
396
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#hasKey}.
|
397
|
-
*/
|
398
|
-
hasSecretStorageKey(keyID?: string): Promise<boolean>;
|
399
|
-
/**
|
400
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#getKey}.
|
401
|
-
*/
|
402
|
-
getSecretStorageKey(keyID?: string): Promise<SecretStorageKeyTuple | null>;
|
403
|
-
/**
|
404
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#store}.
|
405
|
-
*/
|
406
|
-
storeSecret(name: string, secret: string, keys?: string[]): Promise<void>;
|
407
|
-
/**
|
408
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#get}.
|
409
|
-
*/
|
410
|
-
getSecret(name: string): Promise<string | undefined>;
|
411
|
-
/**
|
412
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#isStored}.
|
413
|
-
*/
|
414
|
-
isSecretStored(name: string): Promise<Record<string, SecretStorageKeyDescription> | null>;
|
415
|
-
requestSecret(name: string, devices: string[]): ISecretRequest;
|
416
|
-
/**
|
417
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#getDefaultKeyId}.
|
418
|
-
*/
|
419
|
-
getDefaultSecretStorageKeyId(): Promise<string | null>;
|
420
|
-
/**
|
421
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#setDefaultKeyId}.
|
422
|
-
*/
|
423
|
-
setDefaultSecretStorageKeyId(k: string): Promise<void>;
|
424
|
-
/**
|
425
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#checkKey}.
|
426
|
-
*/
|
427
|
-
checkSecretStorageKey(key: Uint8Array, info: SecretStorageKeyDescription): Promise<boolean>;
|
428
|
-
/**
|
429
|
-
* Checks that a given secret storage private key matches a given public key.
|
430
|
-
* This can be used by the getSecretStorageKey callback to verify that the
|
431
|
-
* private key it is about to supply is the one that was requested.
|
432
|
-
*
|
433
|
-
* @param privateKey - The private key
|
434
|
-
* @param expectedPublicKey - The public key
|
435
|
-
* @returns true if the key matches, otherwise false
|
436
|
-
*/
|
437
|
-
checkSecretStoragePrivateKey(privateKey: Uint8Array, expectedPublicKey: string): boolean;
|
438
|
-
/**
|
439
|
-
* Fetches the backup private key, if cached
|
440
|
-
* @returns the key, if any, or null
|
441
|
-
*/
|
442
|
-
getSessionBackupPrivateKey(): Promise<Uint8Array | null>;
|
443
|
-
/**
|
444
|
-
* Stores the session backup key to the cache
|
445
|
-
* @param key - the private key
|
446
|
-
* @returns a promise so you can catch failures
|
447
|
-
*/
|
448
|
-
storeSessionBackupPrivateKey(key: ArrayLike<number>, version?: string): Promise<void>;
|
449
|
-
/**
|
450
|
-
* Implementation of {@link Crypto.loadSessionBackupPrivateKeyFromSecretStorage}.
|
451
|
-
*/
|
452
|
-
loadSessionBackupPrivateKeyFromSecretStorage(): Promise<void>;
|
453
|
-
/**
|
454
|
-
* Get the current status of key backup.
|
455
|
-
*
|
456
|
-
* Implementation of {@link Crypto.CryptoApi.getActiveSessionBackupVersion}.
|
457
|
-
*/
|
458
|
-
getActiveSessionBackupVersion(): Promise<string | null>;
|
459
|
-
/**
|
460
|
-
* Implementation of {@link Crypto.CryptoApi#getKeyBackupInfo}.
|
461
|
-
*/
|
462
|
-
getKeyBackupInfo(): Promise<KeyBackupInfo | null>;
|
463
|
-
/**
|
464
|
-
* Determine if a key backup can be trusted.
|
465
|
-
*
|
466
|
-
* Implementation of {@link Crypto.CryptoApi.isKeyBackupTrusted}.
|
467
|
-
*/
|
468
|
-
isKeyBackupTrusted(info: KeyBackupInfo): Promise<BackupTrustInfo>;
|
469
|
-
/**
|
470
|
-
* Force a re-check of the key backup and enable/disable it as appropriate.
|
471
|
-
*
|
472
|
-
* Implementation of {@link Crypto.CryptoApi.checkKeyBackupAndEnable}.
|
473
|
-
*/
|
474
|
-
checkKeyBackupAndEnable(): Promise<KeyBackupCheck | null>;
|
475
|
-
/**
|
476
|
-
* Checks that a given cross-signing private key matches a given public key.
|
477
|
-
* This can be used by the getCrossSigningKey callback to verify that the
|
478
|
-
* private key it is about to supply is the one that was requested.
|
479
|
-
*
|
480
|
-
* @param privateKey - The private key
|
481
|
-
* @param expectedPublicKey - The public key
|
482
|
-
* @returns true if the key matches, otherwise false
|
483
|
-
*/
|
484
|
-
checkCrossSigningPrivateKey(privateKey: Uint8Array, expectedPublicKey: string): boolean;
|
485
|
-
/**
|
486
|
-
* Run various follow-up actions after cross-signing keys have changed locally
|
487
|
-
* (either by resetting the keys for the account or by getting them from secret
|
488
|
-
* storage), such as signing the current device, upgrading device
|
489
|
-
* verifications, etc.
|
490
|
-
*/
|
491
|
-
private afterCrossSigningLocalKeyChange;
|
492
|
-
/**
|
493
|
-
* Check if a user's cross-signing key is a candidate for upgrading from device
|
494
|
-
* verification.
|
495
|
-
*
|
496
|
-
* @param userId - the user whose cross-signing information is to be checked
|
497
|
-
* @param crossSigningInfo - the cross-signing information to check
|
498
|
-
*/
|
499
|
-
private checkForDeviceVerificationUpgrade;
|
500
|
-
/**
|
501
|
-
* Check if the cross-signing key is signed by a verified device.
|
502
|
-
*
|
503
|
-
* @param userId - the user ID whose key is being checked
|
504
|
-
* @param key - the key that is being checked
|
505
|
-
* @param devices - the user's devices. Should be a map from device ID
|
506
|
-
* to device info
|
507
|
-
*/
|
508
|
-
private checkForValidDeviceSignature;
|
509
|
-
/**
|
510
|
-
* Get the user's cross-signing key ID.
|
511
|
-
*
|
512
|
-
* @param type - The type of key to get the ID of. One of
|
513
|
-
* "master", "self_signing", or "user_signing". Defaults to "master".
|
514
|
-
*
|
515
|
-
* @returns the key ID
|
516
|
-
*/
|
517
|
-
getCrossSigningKeyId(type?: CrossSigningKey): Promise<string | null>;
|
518
|
-
getCrossSigningId(type: string): string | null;
|
519
|
-
/**
|
520
|
-
* Get the cross signing information for a given user.
|
521
|
-
*
|
522
|
-
* @param userId - the user ID to get the cross-signing info for.
|
523
|
-
*
|
524
|
-
* @returns the cross signing information for the user.
|
525
|
-
*/
|
526
|
-
getStoredCrossSigningForUser(userId: string): CrossSigningInfo | null;
|
527
|
-
/**
|
528
|
-
* Check whether a given user is trusted.
|
529
|
-
*
|
530
|
-
* @param userId - The ID of the user to check.
|
531
|
-
*
|
532
|
-
* @returns
|
533
|
-
*/
|
534
|
-
checkUserTrust(userId: string): UserTrustLevel;
|
535
|
-
/**
|
536
|
-
* Implementation of {@link Crypto.CryptoApi.getUserVerificationStatus}.
|
537
|
-
*/
|
538
|
-
getUserVerificationStatus(userId: string): Promise<UserTrustLevel>;
|
539
|
-
/**
|
540
|
-
* Implementation of {@link Crypto.CryptoApi.pinCurrentUserIdentity}.
|
541
|
-
*/
|
542
|
-
pinCurrentUserIdentity(userId: string): Promise<void>;
|
543
|
-
/**
|
544
|
-
* Check whether a given device is trusted.
|
545
|
-
*
|
546
|
-
* @param userId - The ID of the user whose device is to be checked.
|
547
|
-
* @param deviceId - The ID of the device to check
|
548
|
-
*/
|
549
|
-
getDeviceVerificationStatus(userId: string, deviceId: string): Promise<DeviceVerificationStatus | null>;
|
550
|
-
/**
|
551
|
-
* @deprecated Use {@link Crypto.CryptoApi.getDeviceVerificationStatus}.
|
552
|
-
*/
|
553
|
-
checkDeviceTrust(userId: string, deviceId: string): DeviceTrustLevel;
|
554
|
-
/**
|
555
|
-
* Check whether a given deviceinfo is trusted.
|
556
|
-
*
|
557
|
-
* @param userId - The ID of the user whose devices is to be checked.
|
558
|
-
* @param device - The device info object to check
|
559
|
-
*
|
560
|
-
* @deprecated Use {@link Crypto.CryptoApi.getDeviceVerificationStatus}.
|
561
|
-
*/
|
562
|
-
checkDeviceInfoTrust(userId: string, device?: DeviceInfo): DeviceTrustLevel;
|
563
|
-
/**
|
564
|
-
* Check whether one of our own devices is cross-signed by our
|
565
|
-
* user's stored keys, regardless of whether we trust those keys yet.
|
566
|
-
*
|
567
|
-
* @param deviceId - The ID of the device to check
|
568
|
-
*
|
569
|
-
* @returns true if the device is cross-signed
|
570
|
-
*/
|
571
|
-
checkIfOwnDeviceCrossSigned(deviceId: string): boolean;
|
572
|
-
private onDeviceListUserCrossSigningUpdated;
|
573
|
-
/**
|
574
|
-
* Check the copy of our cross-signing key that we have in the device list and
|
575
|
-
* see if we can get the private key. If so, mark it as trusted.
|
576
|
-
*/
|
577
|
-
checkOwnCrossSigningTrust({ allowPrivateKeyRequests, }?: ICheckOwnCrossSigningTrustOpts): Promise<void>;
|
578
|
-
/**
|
579
|
-
* Implementation of {@link CryptoBackend#getBackupDecryptor}.
|
580
|
-
*/
|
581
|
-
getBackupDecryptor(backupInfo: KeyBackupInfo, privKey: ArrayLike<number>): Promise<BackupDecryptor>;
|
582
|
-
/**
|
583
|
-
* Implementation of {@link CryptoBackend#importBackedUpRoomKeys}.
|
584
|
-
*/
|
585
|
-
importBackedUpRoomKeys(keys: IMegolmSessionData[], backupVersion: string, opts?: ImportRoomKeysOpts): Promise<void>;
|
586
|
-
/**
|
587
|
-
* Store a set of keys as our own, trusted, cross-signing keys.
|
588
|
-
*
|
589
|
-
* @param keys - The new trusted set of keys
|
590
|
-
*/
|
591
|
-
private storeTrustedSelfKeys;
|
592
|
-
/**
|
593
|
-
* Check if the master key is signed by a verified device, and if so, prompt
|
594
|
-
* the application to mark it as verified.
|
595
|
-
*
|
596
|
-
* @param userId - the user ID whose key should be checked
|
597
|
-
*/
|
598
|
-
private checkDeviceVerifications;
|
599
|
-
/**
|
600
|
-
*/
|
601
|
-
enableLazyLoading(): void;
|
602
|
-
/**
|
603
|
-
* Tell the crypto module to register for MatrixClient events which it needs to
|
604
|
-
* listen for
|
605
|
-
*
|
606
|
-
* @param eventEmitter - event source where we can register
|
607
|
-
* for event notifications
|
608
|
-
*/
|
609
|
-
registerEventHandlers(eventEmitter: TypedEventEmitter<RoomMemberEvent.Membership | ClientEvent.ToDeviceEvent | RoomEvent.Timeline | MatrixEventEvent.Decrypted, any>): void;
|
610
|
-
/**
|
611
|
-
* @deprecated this does nothing and will be removed in a future version
|
612
|
-
*/
|
613
|
-
start(): void;
|
614
|
-
/** Stop background processes related to crypto */
|
615
|
-
stop(): void;
|
616
|
-
/**
|
617
|
-
* Get the Ed25519 key for this device
|
618
|
-
*
|
619
|
-
* @returns base64-encoded ed25519 key.
|
620
|
-
*
|
621
|
-
* @deprecated Use {@link Crypto.CryptoApi#getOwnDeviceKeys}.
|
622
|
-
*/
|
623
|
-
getDeviceEd25519Key(): string | null;
|
624
|
-
/**
|
625
|
-
* Get the Curve25519 key for this device
|
626
|
-
*
|
627
|
-
* @returns base64-encoded curve25519 key.
|
628
|
-
*
|
629
|
-
* @deprecated Use {@link Crypto.CryptoApi#getOwnDeviceKeys}
|
630
|
-
*/
|
631
|
-
getDeviceCurve25519Key(): string | null;
|
632
|
-
/**
|
633
|
-
* Implementation of {@link Crypto.CryptoApi#getOwnDeviceKeys}.
|
634
|
-
*/
|
635
|
-
getOwnDeviceKeys(): Promise<OwnDeviceKeys>;
|
636
|
-
/**
|
637
|
-
* Set the global override for whether the client should ever send encrypted
|
638
|
-
* messages to unverified devices. This provides the default for rooms which
|
639
|
-
* do not specify a value.
|
640
|
-
*
|
641
|
-
* @param value - whether to blacklist all unverified devices by default
|
642
|
-
*
|
643
|
-
* @deprecated Set {@link Crypto.CryptoApi#globalBlacklistUnverifiedDevices | CryptoApi.globalBlacklistUnverifiedDevices} directly.
|
644
|
-
*/
|
645
|
-
setGlobalBlacklistUnverifiedDevices(value: boolean): void;
|
646
|
-
/**
|
647
|
-
* @returns whether to blacklist all unverified devices by default
|
648
|
-
*
|
649
|
-
* @deprecated Reference {@link Crypto.CryptoApi#globalBlacklistUnverifiedDevices | CryptoApi.globalBlacklistUnverifiedDevices} directly.
|
650
|
-
*/
|
651
|
-
getGlobalBlacklistUnverifiedDevices(): boolean;
|
652
|
-
/**
|
653
|
-
* Upload the device keys to the homeserver.
|
654
|
-
* @returns A promise that will resolve when the keys are uploaded.
|
655
|
-
*/
|
656
|
-
uploadDeviceKeys(): Promise<IKeysUploadResponse>;
|
657
|
-
getNeedsNewFallback(): boolean;
|
658
|
-
private maybeUploadOneTimeKeys;
|
659
|
-
private uploadOneTimeKeys;
|
660
|
-
/**
|
661
|
-
* Download the keys for a list of users and stores the keys in the session
|
662
|
-
* store.
|
663
|
-
* @param userIds - The users to fetch.
|
664
|
-
* @param forceDownload - Always download the keys even if cached.
|
665
|
-
*
|
666
|
-
* @returns A promise which resolves to a map `userId->deviceId->{@link DeviceInfo}`.
|
667
|
-
*/
|
668
|
-
downloadKeys(userIds: string[], forceDownload?: boolean): Promise<DeviceInfoMap>;
|
669
|
-
/**
|
670
|
-
* Get the stored device keys for a user id
|
671
|
-
*
|
672
|
-
* @param userId - the user to list keys for.
|
673
|
-
*
|
674
|
-
* @returns list of devices, or null if we haven't
|
675
|
-
* managed to get a list of devices for this user yet.
|
676
|
-
*/
|
677
|
-
getStoredDevicesForUser(userId: string): Array<DeviceInfo> | null;
|
678
|
-
/**
|
679
|
-
* Get the device information for the given list of users.
|
680
|
-
*
|
681
|
-
* @param userIds - The users to fetch.
|
682
|
-
* @param downloadUncached - If true, download the device list for users whose device list we are not
|
683
|
-
* currently tracking. Defaults to false, in which case such users will not appear at all in the result map.
|
684
|
-
*
|
685
|
-
* @returns A map `{@link DeviceMap}`.
|
686
|
-
*/
|
687
|
-
getUserDeviceInfo(userIds: string[], downloadUncached?: boolean): Promise<DeviceMap>;
|
688
|
-
/**
|
689
|
-
* Get the stored keys for a single device
|
690
|
-
*
|
691
|
-
*
|
692
|
-
* @returns device, or undefined
|
693
|
-
* if we don't know about this device
|
694
|
-
*/
|
695
|
-
getStoredDevice(userId: string, deviceId: string): DeviceInfo | undefined;
|
696
|
-
/**
|
697
|
-
* Save the device list, if necessary
|
698
|
-
*
|
699
|
-
* @param delay - Time in ms before which the save actually happens.
|
700
|
-
* By default, the save is delayed for a short period in order to batch
|
701
|
-
* multiple writes, but this behaviour can be disabled by passing 0.
|
702
|
-
*
|
703
|
-
* @returns true if the data was saved, false if
|
704
|
-
* it was not (eg. because no changes were pending). The promise
|
705
|
-
* will only resolve once the data is saved, so may take some time
|
706
|
-
* to resolve.
|
707
|
-
*/
|
708
|
-
saveDeviceList(delay: number): Promise<boolean>;
|
709
|
-
/**
|
710
|
-
* Mark the given device as locally verified.
|
711
|
-
*
|
712
|
-
* Implementation of {@link Crypto.CryptoApi#setDeviceVerified}.
|
713
|
-
*/
|
714
|
-
setDeviceVerified(userId: string, deviceId: string, verified?: boolean): Promise<void>;
|
715
|
-
/**
|
716
|
-
* Blindly cross-sign one of our other devices.
|
717
|
-
*
|
718
|
-
* Implementation of {@link Crypto.CryptoApi#crossSignDevice}.
|
719
|
-
*/
|
720
|
-
crossSignDevice(deviceId: string): Promise<void>;
|
721
|
-
/**
|
722
|
-
* Update the blocked/verified state of the given device
|
723
|
-
*
|
724
|
-
* @param userId - owner of the device
|
725
|
-
* @param deviceId - unique identifier for the device or user's
|
726
|
-
* cross-signing public key ID.
|
727
|
-
*
|
728
|
-
* @param verified - whether to mark the device as verified. Null to
|
729
|
-
* leave unchanged.
|
730
|
-
*
|
731
|
-
* @param blocked - whether to mark the device as blocked. Null to
|
732
|
-
* leave unchanged.
|
733
|
-
*
|
734
|
-
* @param known - whether to mark that the user has been made aware of
|
735
|
-
* the existence of this device. Null to leave unchanged
|
736
|
-
*
|
737
|
-
* @param keys - The list of keys that was present
|
738
|
-
* during the device verification. This will be double checked with the list
|
739
|
-
* of keys the given device has currently.
|
740
|
-
*
|
741
|
-
* @returns updated DeviceInfo
|
742
|
-
*/
|
743
|
-
setDeviceVerification(userId: string, deviceId: string, verified?: boolean | null, blocked?: boolean | null, known?: boolean | null, keys?: Record<string, string>): Promise<DeviceInfo | CrossSigningInfo | CrossSigningKeyInfo | undefined>;
|
744
|
-
findVerificationRequestDMInProgress(roomId: string, userId?: string): VerificationRequest | undefined;
|
745
|
-
getVerificationRequestsToDeviceInProgress(userId: string): VerificationRequest[];
|
746
|
-
requestVerificationDM(userId: string, roomId: string): Promise<VerificationRequest>;
|
747
|
-
/** @deprecated Use `requestOwnUserVerificationToDevice` or `requestDeviceVerification` */
|
748
|
-
requestVerification(userId: string, devices?: string[]): Promise<VerificationRequest>;
|
749
|
-
requestOwnUserVerification(): Promise<VerificationRequest>;
|
750
|
-
requestDeviceVerification(userId: string, deviceId: string): Promise<VerificationRequest>;
|
751
|
-
private requestVerificationWithChannel;
|
752
|
-
beginKeyVerification(method: string, userId: string, deviceId: string, transactionId?: string | null): VerificationBase<any, any>;
|
753
|
-
legacyDeviceVerification(userId: string, deviceId: string, method: VerificationMethod): Promise<VerificationRequest>;
|
754
|
-
/**
|
755
|
-
* Get information on the active olm sessions with a user
|
756
|
-
* <p>
|
757
|
-
* Returns a map from device id to an object with keys 'deviceIdKey' (the
|
758
|
-
* device's curve25519 identity key) and 'sessions' (an array of objects in the
|
759
|
-
* same format as that returned by
|
760
|
-
* {@link OlmDevice#getSessionInfoForDevice}).
|
761
|
-
* <p>
|
762
|
-
* This method is provided for debugging purposes.
|
763
|
-
*
|
764
|
-
* @param userId - id of user to inspect
|
765
|
-
*/
|
766
|
-
getOlmSessionsForUser(userId: string): Promise<Record<string, IUserOlmSession>>;
|
767
|
-
/**
|
768
|
-
* Get the device which sent an event
|
769
|
-
*
|
770
|
-
* @param event - event to be checked
|
771
|
-
*/
|
772
|
-
getEventSenderDeviceInfo(event: MatrixEvent): DeviceInfo | null;
|
773
|
-
/**
|
774
|
-
* Get information about the encryption of an event
|
775
|
-
*
|
776
|
-
* @param event - event to be checked
|
777
|
-
*
|
778
|
-
* @returns An object with the fields:
|
779
|
-
* - encrypted: whether the event is encrypted (if not encrypted, some of the
|
780
|
-
* other properties may not be set)
|
781
|
-
* - senderKey: the sender's key
|
782
|
-
* - algorithm: the algorithm used to encrypt the event
|
783
|
-
* - authenticated: whether we can be sure that the owner of the senderKey
|
784
|
-
* sent the event
|
785
|
-
* - sender: the sender's device information, if available
|
786
|
-
* - mismatchedSender: if the event's ed25519 and curve25519 keys don't match
|
787
|
-
* (only meaningful if `sender` is set)
|
788
|
-
*/
|
789
|
-
getEventEncryptionInfo(event: MatrixEvent): IEncryptedEventInfo;
|
790
|
-
/**
|
791
|
-
* Implementation of {@link Crypto.CryptoApi.getEncryptionInfoForEvent}.
|
792
|
-
*/
|
793
|
-
getEncryptionInfoForEvent(event: MatrixEvent): Promise<EventEncryptionInfo | null>;
|
794
|
-
/**
|
795
|
-
* Forces the current outbound group session to be discarded such
|
796
|
-
* that another one will be created next time an event is sent.
|
797
|
-
*
|
798
|
-
* @param roomId - The ID of the room to discard the session for
|
799
|
-
*
|
800
|
-
* This should not normally be necessary.
|
801
|
-
*/
|
802
|
-
forceDiscardSession(roomId: string): Promise<void>;
|
803
|
-
/**
|
804
|
-
* Configure a room to use encryption (ie, save a flag in the cryptoStore).
|
805
|
-
*
|
806
|
-
* @param roomId - The room ID to enable encryption in.
|
807
|
-
*
|
808
|
-
* @param config - The encryption config for the room.
|
809
|
-
*
|
810
|
-
* @param inhibitDeviceQuery - true to suppress device list query for
|
811
|
-
* users in the room (for now). In case lazy loading is enabled,
|
812
|
-
* the device query is always inhibited as the members are not tracked.
|
813
|
-
*
|
814
|
-
* @deprecated It is normally incorrect to call this method directly. Encryption
|
815
|
-
* is enabled by receiving an `m.room.encryption` event (which we may have sent
|
816
|
-
* previously).
|
817
|
-
*/
|
818
|
-
setRoomEncryption(roomId: string, config: IRoomEncryption, inhibitDeviceQuery?: boolean): Promise<void>;
|
819
|
-
/**
|
820
|
-
* Set up encryption for a room.
|
821
|
-
*
|
822
|
-
* This is called when an <tt>m.room.encryption</tt> event is received. It saves a flag
|
823
|
-
* for the room in the cryptoStore (if it wasn't already set), sets up an "encryptor" for
|
824
|
-
* the room, and enables device-list tracking for the room.
|
825
|
-
*
|
826
|
-
* It does <em>not</em> initiate a device list query for the room. That is normally
|
827
|
-
* done once we finish processing the sync, in onSyncCompleted.
|
828
|
-
*
|
829
|
-
* @param room - The room to enable encryption in.
|
830
|
-
* @param config - The encryption config for the room.
|
831
|
-
*/
|
832
|
-
private setRoomEncryptionImpl;
|
833
|
-
/**
|
834
|
-
* Make sure we are tracking the device lists for all users in this room.
|
835
|
-
*
|
836
|
-
* @param roomId - The room ID to start tracking devices in.
|
837
|
-
* @returns when all devices for the room have been fetched and marked to track
|
838
|
-
* @deprecated there's normally no need to call this function: device list tracking
|
839
|
-
* will be enabled as soon as we have the full membership list.
|
840
|
-
*/
|
841
|
-
trackRoomDevices(roomId: string): Promise<void>;
|
842
|
-
/**
|
843
|
-
* Make sure we are tracking the device lists for all users in this room.
|
844
|
-
*
|
845
|
-
* This is normally called when we are about to send an encrypted event, to make sure
|
846
|
-
* we have all the devices in the room; but it is also called when processing an
|
847
|
-
* m.room.encryption state event (if lazy-loading is disabled), or when members are
|
848
|
-
* loaded (if lazy-loading is enabled), to prepare the device list.
|
849
|
-
*
|
850
|
-
* @param room - Room to enable device-list tracking in
|
851
|
-
*/
|
852
|
-
private trackRoomDevicesImpl;
|
853
|
-
/**
|
854
|
-
* Try to make sure we have established olm sessions for all known devices for
|
855
|
-
* the given users.
|
856
|
-
*
|
857
|
-
* @param users - list of user ids
|
858
|
-
* @param force - If true, force a new Olm session to be created. Default false.
|
859
|
-
*
|
860
|
-
* @returns resolves once the sessions are complete, to
|
861
|
-
* an Object mapping from userId to deviceId to
|
862
|
-
* `IOlmSessionResult`
|
863
|
-
*/
|
864
|
-
ensureOlmSessionsForUsers(users: string[], force?: boolean): Promise<Map<string, Map<string, olmlib.IOlmSessionResult>>>;
|
865
|
-
/**
|
866
|
-
* Get a list containing all of the room keys
|
867
|
-
*
|
868
|
-
* @returns a list of session export objects
|
869
|
-
*/
|
870
|
-
exportRoomKeys(): Promise<IMegolmSessionData[]>;
|
871
|
-
/**
|
872
|
-
* Get a JSON list containing all of the room keys
|
873
|
-
*
|
874
|
-
* @returns a JSON string encoding a list of session
|
875
|
-
* export objects, each of which is an IMegolmSessionData
|
876
|
-
*/
|
877
|
-
exportRoomKeysAsJson(): Promise<string>;
|
878
|
-
/**
|
879
|
-
* Import a list of room keys previously exported by exportRoomKeys
|
880
|
-
*
|
881
|
-
* @param keys - a list of session export objects
|
882
|
-
* @returns a promise which resolves once the keys have been imported
|
883
|
-
*/
|
884
|
-
importRoomKeys(keys: IMegolmSessionData[], opts?: ImportRoomKeysOpts): Promise<void>;
|
885
|
-
/**
|
886
|
-
* Import a JSON string encoding a list of room keys previously
|
887
|
-
* exported by exportRoomKeysAsJson
|
888
|
-
*
|
889
|
-
* @param keys - a JSON string encoding a list of session export
|
890
|
-
* objects, each of which is an IMegolmSessionData
|
891
|
-
* @param opts - options object
|
892
|
-
* @returns a promise which resolves once the keys have been imported
|
893
|
-
*/
|
894
|
-
importRoomKeysAsJson(keys: string, opts?: ImportRoomKeysOpts): Promise<void>;
|
895
|
-
/**
|
896
|
-
* Counts the number of end to end session keys that are waiting to be backed up
|
897
|
-
* @returns Promise which resolves to the number of sessions requiring backup
|
898
|
-
*/
|
899
|
-
countSessionsNeedingBackup(): Promise<number>;
|
900
|
-
/**
|
901
|
-
* Perform any background tasks that can be done before a message is ready to
|
902
|
-
* send, in order to speed up sending of the message.
|
903
|
-
*
|
904
|
-
* @param room - the room the event is in
|
905
|
-
*/
|
906
|
-
prepareToEncrypt(room: Room): void;
|
907
|
-
/**
|
908
|
-
* Encrypt an event according to the configuration of the room.
|
909
|
-
*
|
910
|
-
* @param event - event to be sent
|
911
|
-
*
|
912
|
-
* @param room - destination room.
|
913
|
-
*
|
914
|
-
* @returns Promise which resolves when the event has been
|
915
|
-
* encrypted, or null if nothing was needed
|
916
|
-
*/
|
917
|
-
encryptEvent(event: MatrixEvent, room: Room): Promise<void>;
|
918
|
-
/**
|
919
|
-
* Decrypt a received event
|
920
|
-
*
|
921
|
-
*
|
922
|
-
* @returns resolves once we have
|
923
|
-
* finished decrypting. Rejects with an `algorithms.DecryptionError` if there
|
924
|
-
* is a problem decrypting the event.
|
925
|
-
*/
|
926
|
-
decryptEvent(event: MatrixEvent): Promise<IEventDecryptionResult>;
|
927
|
-
/**
|
928
|
-
* Handle the notification from /sync that device lists have
|
929
|
-
* been changed.
|
930
|
-
*
|
931
|
-
* @param deviceLists - device_lists field from /sync
|
932
|
-
*/
|
933
|
-
processDeviceLists(deviceLists: IDeviceLists): Promise<void>;
|
934
|
-
/**
|
935
|
-
* Send a request for some room keys, if we have not already done so
|
936
|
-
*
|
937
|
-
* @param resend - whether to resend the key request if there is
|
938
|
-
* already one
|
939
|
-
*
|
940
|
-
* @returns a promise that resolves when the key request is queued
|
941
|
-
*/
|
942
|
-
requestRoomKey(requestBody: IRoomKeyRequestBody, recipients: IRoomKeyRequestRecipient[], resend?: boolean): Promise<void>;
|
943
|
-
/**
|
944
|
-
* Cancel any earlier room key request
|
945
|
-
*
|
946
|
-
* @param requestBody - parameters to match for cancellation
|
947
|
-
*/
|
948
|
-
cancelRoomKeyRequest(requestBody: IRoomKeyRequestBody): void;
|
949
|
-
/**
|
950
|
-
* Re-send any outgoing key requests, eg after verification
|
951
|
-
* @returns
|
952
|
-
*/
|
953
|
-
cancelAndResendAllOutgoingKeyRequests(): Promise<void>;
|
954
|
-
/**
|
955
|
-
* handle an m.room.encryption event
|
956
|
-
*
|
957
|
-
* @param room - in which the event was received
|
958
|
-
* @param event - encryption event to be processed
|
959
|
-
*/
|
960
|
-
onCryptoEvent(room: Room, event: MatrixEvent): Promise<void>;
|
961
|
-
/**
|
962
|
-
* Called before the result of a sync is processed
|
963
|
-
*
|
964
|
-
* @param syncData - the data from the 'MatrixClient.sync' event
|
965
|
-
*/
|
966
|
-
onSyncWillProcess(syncData: ISyncStateData): Promise<void>;
|
967
|
-
/**
|
968
|
-
* handle the completion of a /sync
|
969
|
-
*
|
970
|
-
* This is called after the processing of each successful /sync response.
|
971
|
-
* It is an opportunity to do a batch process on the information received.
|
972
|
-
*
|
973
|
-
* @param syncData - the data from the 'MatrixClient.sync' event
|
974
|
-
*/
|
975
|
-
onSyncCompleted(syncData: OnSyncCompletedData): Promise<void>;
|
976
|
-
/**
|
977
|
-
* Trigger the appropriate invalidations and removes for a given
|
978
|
-
* device list
|
979
|
-
*
|
980
|
-
* @param deviceLists - device_lists field from /sync, or response from
|
981
|
-
* /keys/changes
|
982
|
-
*/
|
983
|
-
private evalDeviceListChanges;
|
984
|
-
/**
|
985
|
-
* Get a list of all the IDs of users we share an e2e room with
|
986
|
-
* for which we are tracking devices already
|
987
|
-
*
|
988
|
-
* @returns List of user IDs
|
989
|
-
*/
|
990
|
-
private getTrackedE2eUsers;
|
991
|
-
/**
|
992
|
-
* Get a list of the e2e-enabled rooms we are members of,
|
993
|
-
* and for which we are already tracking the devices
|
994
|
-
*
|
995
|
-
* @returns
|
996
|
-
*/
|
997
|
-
private getTrackedE2eRooms;
|
998
|
-
/**
|
999
|
-
* Encrypts and sends a given object via Olm to-device messages to a given
|
1000
|
-
* set of devices.
|
1001
|
-
* @param userDeviceInfoArr - the devices to send to
|
1002
|
-
* @param payload - fields to include in the encrypted payload
|
1003
|
-
* @returns Promise which
|
1004
|
-
* resolves once the message has been encrypted and sent to the given
|
1005
|
-
* userDeviceMap, and returns the `{ contentMap, deviceInfoByDeviceId }`
|
1006
|
-
* of the successfully sent messages.
|
1007
|
-
*
|
1008
|
-
* @deprecated Instead use {@link encryptToDeviceMessages} followed by {@link MatrixClient.queueToDevice}.
|
1009
|
-
*/
|
1010
|
-
encryptAndSendToDevices(userDeviceInfoArr: IOlmDevice<DeviceInfo>[], payload: object): Promise<void>;
|
1011
|
-
private prepareToDeviceBatch;
|
1012
|
-
/**
|
1013
|
-
* Implementation of {@link Crypto.CryptoApi#encryptToDeviceMessages}.
|
1014
|
-
*/
|
1015
|
-
encryptToDeviceMessages(eventType: string, devices: {
|
1016
|
-
userId: string;
|
1017
|
-
deviceId: string;
|
1018
|
-
}[], payload: ToDevicePayload): Promise<ToDeviceBatch>;
|
1019
|
-
private onMembership;
|
1020
|
-
preprocessToDeviceMessages(events: IToDeviceEvent[]): Promise<IToDeviceEvent[]>;
|
1021
|
-
/**
|
1022
|
-
* Stores the current one_time_key count which will be handled later (in a call of
|
1023
|
-
* onSyncCompleted).
|
1024
|
-
*
|
1025
|
-
* @param currentCount - The current count of one_time_keys to be stored
|
1026
|
-
*/
|
1027
|
-
private updateOneTimeKeyCount;
|
1028
|
-
processKeyCounts(oneTimeKeysCounts?: Record<string, number>, unusedFallbackKeys?: string[]): Promise<void>;
|
1029
|
-
private onToDeviceEvent;
|
1030
|
-
/**
|
1031
|
-
* Handle a key event
|
1032
|
-
*
|
1033
|
-
* @internal
|
1034
|
-
* @param event - key event
|
1035
|
-
*/
|
1036
|
-
private onRoomKeyEvent;
|
1037
|
-
/**
|
1038
|
-
* Handle a key withheld event
|
1039
|
-
*
|
1040
|
-
* @internal
|
1041
|
-
* @param event - key withheld event
|
1042
|
-
*/
|
1043
|
-
private onRoomKeyWithheldEvent;
|
1044
|
-
/**
|
1045
|
-
* Handle a general key verification event.
|
1046
|
-
*
|
1047
|
-
* @internal
|
1048
|
-
* @param event - verification start event
|
1049
|
-
*/
|
1050
|
-
private onKeyVerificationMessage;
|
1051
|
-
/**
|
1052
|
-
* Handle key verification requests sent as timeline events
|
1053
|
-
*
|
1054
|
-
* @internal
|
1055
|
-
* @param event - the timeline event
|
1056
|
-
* @param room - not used
|
1057
|
-
* @param atStart - not used
|
1058
|
-
* @param removed - not used
|
1059
|
-
* @param whether - this is a live event
|
1060
|
-
*/
|
1061
|
-
private onTimelineEvent;
|
1062
|
-
private handleVerificationEvent;
|
1063
|
-
/**
|
1064
|
-
* Handle a toDevice event that couldn't be decrypted
|
1065
|
-
*
|
1066
|
-
* @internal
|
1067
|
-
* @param event - undecryptable event
|
1068
|
-
*/
|
1069
|
-
private onToDeviceBadEncrypted;
|
1070
|
-
/**
|
1071
|
-
* Handle a change in the membership state of a member of a room
|
1072
|
-
*
|
1073
|
-
* @internal
|
1074
|
-
* @param event - event causing the change
|
1075
|
-
* @param member - user whose membership changed
|
1076
|
-
* @param oldMembership - previous membership
|
1077
|
-
*/
|
1078
|
-
private onRoomMembership;
|
1079
|
-
/**
|
1080
|
-
* Called when we get an m.room_key_request event.
|
1081
|
-
*
|
1082
|
-
* @internal
|
1083
|
-
* @param event - key request event
|
1084
|
-
*/
|
1085
|
-
private onRoomKeyRequestEvent;
|
1086
|
-
/**
|
1087
|
-
* Process any m.room_key_request events which were queued up during the
|
1088
|
-
* current sync.
|
1089
|
-
*
|
1090
|
-
* @internal
|
1091
|
-
*/
|
1092
|
-
private processReceivedRoomKeyRequests;
|
1093
|
-
/**
|
1094
|
-
* Helper for processReceivedRoomKeyRequests
|
1095
|
-
*
|
1096
|
-
*/
|
1097
|
-
private processReceivedRoomKeyRequest;
|
1098
|
-
/**
|
1099
|
-
* Helper for processReceivedRoomKeyRequests
|
1100
|
-
*
|
1101
|
-
*/
|
1102
|
-
private processReceivedRoomKeyRequestCancellation;
|
1103
|
-
/**
|
1104
|
-
* Get a decryptor for a given room and algorithm.
|
1105
|
-
*
|
1106
|
-
* If we already have a decryptor for the given room and algorithm, return
|
1107
|
-
* it. Otherwise try to instantiate it.
|
1108
|
-
*
|
1109
|
-
* @internal
|
1110
|
-
*
|
1111
|
-
* @param roomId - room id for decryptor. If undefined, a temporary
|
1112
|
-
* decryptor is instantiated.
|
1113
|
-
*
|
1114
|
-
* @param algorithm - crypto algorithm
|
1115
|
-
*
|
1116
|
-
* @throws `DecryptionError` if the algorithm is unknown
|
1117
|
-
*/
|
1118
|
-
getRoomDecryptor(roomId: string | null, algorithm: string): DecryptionAlgorithm;
|
1119
|
-
/**
|
1120
|
-
* Get all the room decryptors for a given encryption algorithm.
|
1121
|
-
*
|
1122
|
-
* @param algorithm - The encryption algorithm
|
1123
|
-
*
|
1124
|
-
* @returns An array of room decryptors
|
1125
|
-
*/
|
1126
|
-
private getRoomDecryptors;
|
1127
|
-
/**
|
1128
|
-
* sign the given object with our ed25519 key
|
1129
|
-
*
|
1130
|
-
* @param obj - Object to which we will add a 'signatures' property
|
1131
|
-
*/
|
1132
|
-
signObject<T extends ISignableObject & object>(obj: T): Promise<void>;
|
1133
|
-
/**
|
1134
|
-
* @returns true if the room with the supplied ID is encrypted. False if the
|
1135
|
-
* room is not encrypted, or is unknown to us.
|
1136
|
-
*/
|
1137
|
-
isRoomEncrypted(roomId: string): boolean;
|
1138
|
-
/**
|
1139
|
-
* Implementation of {@link Crypto.CryptoApi#isEncryptionEnabledInRoom}.
|
1140
|
-
*/
|
1141
|
-
isEncryptionEnabledInRoom(roomId: string): Promise<boolean>;
|
1142
|
-
/**
|
1143
|
-
* @returns information about the encryption on the room with the supplied
|
1144
|
-
* ID, or null if the room is not encrypted or unknown to us.
|
1145
|
-
*/
|
1146
|
-
getRoomEncryption(roomId: string): IRoomEncryption | null;
|
1147
|
-
/**
|
1148
|
-
* Returns whether dehydrated devices are supported by the crypto backend
|
1149
|
-
* and by the server.
|
1150
|
-
*/
|
1151
|
-
isDehydrationSupported(): Promise<boolean>;
|
1152
|
-
/**
|
1153
|
-
* Stub function -- dehydration is not implemented here, so throw error
|
1154
|
-
*/
|
1155
|
-
startDehydration(createNewKey?: boolean): Promise<void>;
|
1156
|
-
/**
|
1157
|
-
* Stub function -- restoreKeyBackup is not implemented here, so throw error
|
1158
|
-
*/
|
1159
|
-
restoreKeyBackup(opts: KeyBackupRestoreOpts): Promise<KeyBackupRestoreResult>;
|
1160
|
-
/**
|
1161
|
-
* Stub function -- restoreKeyBackupWithPassphrase is not implemented here, so throw error
|
1162
|
-
*/
|
1163
|
-
restoreKeyBackupWithPassphrase(passphrase: string, opts: KeyBackupRestoreOpts): Promise<KeyBackupRestoreResult>;
|
1164
|
-
}
|
1165
|
-
/**
|
1166
|
-
* Fix up the backup key, that may be in the wrong format due to a bug in a
|
1167
|
-
* migration step. Some backup keys were stored as a comma-separated list of
|
1168
|
-
* integers, rather than a base64-encoded byte array. If this function is
|
1169
|
-
* passed a string that looks like a list of integers rather than a base64
|
1170
|
-
* string, it will attempt to convert it to the right format.
|
1171
|
-
*
|
1172
|
-
* @param key - the key to check
|
1173
|
-
* @returns If the key is in the wrong format, then the fixed
|
1174
|
-
* key will be returned. Otherwise null will be returned.
|
1175
|
-
*
|
1176
|
-
*/
|
1177
|
-
export declare function fixBackupKey(key?: string): string | null;
|
1178
|
-
/**
|
1179
|
-
* Represents a received m.room_key_request event
|
1180
|
-
*/
|
1181
|
-
export declare class IncomingRoomKeyRequest {
|
1182
|
-
/** user requesting the key */
|
1183
|
-
readonly userId: string;
|
1184
|
-
/** device requesting the key */
|
1185
|
-
readonly deviceId: string;
|
1186
|
-
/** unique id for the request */
|
1187
|
-
readonly requestId: string;
|
1188
|
-
readonly requestBody: IRoomKeyRequestBody;
|
1189
|
-
/**
|
1190
|
-
* callback which, when called, will ask
|
1191
|
-
* the relevant crypto algorithm implementation to share the keys for
|
1192
|
-
* this request.
|
1193
|
-
*/
|
1194
|
-
share: () => void;
|
1195
|
-
constructor(event: MatrixEvent);
|
1196
|
-
}
|
1197
|
-
/**
|
1198
|
-
* Represents a received m.room_key_request cancellation
|
1199
|
-
*/
|
1200
|
-
declare class IncomingRoomKeyRequestCancellation {
|
1201
|
-
/** user requesting the cancellation */
|
1202
|
-
readonly userId: string;
|
1203
|
-
/** device requesting the cancellation */
|
1204
|
-
readonly deviceId: string;
|
1205
|
-
/** unique id for the request to be cancelled */
|
1206
|
-
readonly requestId: string;
|
1207
|
-
constructor(event: MatrixEvent);
|
1208
|
-
}
|
1209
|
-
export type { IEventDecryptionResult, IMegolmSessionData } from "../@types/crypto.ts";
|
1210
|
-
//# sourceMappingURL=index.d.ts.map
|