@unwanted/matrix-sdk-mini 34.12.0 → 34.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/git-revision.txt +1 -1
- package/lib/@types/event.d.ts +0 -19
- package/lib/@types/event.d.ts.map +1 -1
- package/lib/@types/event.js.map +1 -1
- package/lib/@types/global.d.js +0 -2
- package/lib/@types/global.d.js.map +1 -1
- package/lib/autodiscovery.d.ts +1 -1
- package/lib/autodiscovery.d.ts.map +1 -1
- package/lib/autodiscovery.js.map +1 -1
- package/lib/base64.d.ts +3 -6
- package/lib/base64.d.ts.map +1 -1
- package/lib/base64.js +43 -36
- package/lib/base64.js.map +1 -1
- package/lib/browser-index.d.ts.map +1 -1
- package/lib/browser-index.js +0 -11
- package/lib/browser-index.js.map +1 -1
- package/lib/client.d.ts +2 -1298
- package/lib/client.d.ts.map +1 -1
- package/lib/client.js +348 -2967
- package/lib/client.js.map +1 -1
- package/lib/digest.d.ts +2 -2
- package/lib/digest.d.ts.map +1 -1
- package/lib/digest.js +2 -2
- package/lib/digest.js.map +1 -1
- package/lib/embedded.d.ts +0 -22
- package/lib/embedded.d.ts.map +1 -1
- package/lib/embedded.js +58 -168
- package/lib/embedded.js.map +1 -1
- package/lib/event-mapper.d.ts.map +1 -1
- package/lib/event-mapper.js +0 -4
- package/lib/event-mapper.js.map +1 -1
- package/lib/matrix.d.ts +0 -25
- package/lib/matrix.d.ts.map +1 -1
- package/lib/matrix.js +1 -30
- package/lib/matrix.js.map +1 -1
- package/lib/models/MSC3089Branch.d.ts.map +1 -1
- package/lib/models/MSC3089Branch.js +0 -3
- package/lib/models/MSC3089Branch.js.map +1 -1
- package/lib/models/event-timeline-set.d.ts +6 -10
- package/lib/models/event-timeline-set.d.ts.map +1 -1
- package/lib/models/event-timeline-set.js +28 -36
- package/lib/models/event-timeline-set.js.map +1 -1
- package/lib/models/event-timeline.d.ts +7 -2
- package/lib/models/event-timeline.d.ts.map +1 -1
- package/lib/models/event-timeline.js +8 -9
- package/lib/models/event-timeline.js.map +1 -1
- package/lib/models/event.d.ts +1 -95
- package/lib/models/event.d.ts.map +1 -1
- package/lib/models/event.js +11 -281
- package/lib/models/event.js.map +1 -1
- package/lib/models/poll.d.ts.map +1 -1
- package/lib/models/poll.js +1 -5
- package/lib/models/poll.js.map +1 -1
- package/lib/models/relations-container.d.ts.map +1 -1
- package/lib/models/relations-container.js +1 -7
- package/lib/models/relations-container.js.map +1 -1
- package/lib/models/relations.d.ts +0 -1
- package/lib/models/relations.d.ts.map +1 -1
- package/lib/models/relations.js +0 -8
- package/lib/models/relations.js.map +1 -1
- package/lib/models/room-state.d.ts +2 -13
- package/lib/models/room-state.d.ts.map +1 -1
- package/lib/models/room-state.js +12 -56
- package/lib/models/room-state.js.map +1 -1
- package/lib/models/room.d.ts +2 -20
- package/lib/models/room.d.ts.map +1 -1
- package/lib/models/room.js +121 -162
- package/lib/models/room.js.map +1 -1
- package/lib/models/thread.d.ts.map +1 -1
- package/lib/models/thread.js +5 -4
- package/lib/models/thread.js.map +1 -1
- package/lib/sliding-sync-sdk.d.ts +3 -4
- package/lib/sliding-sync-sdk.d.ts.map +1 -1
- package/lib/sliding-sync-sdk.js +55 -102
- package/lib/sliding-sync-sdk.js.map +1 -1
- package/lib/sliding-sync.js +9 -6
- package/lib/sliding-sync.js.map +1 -1
- package/lib/store/indexeddb.d.ts +1 -1
- package/lib/store/indexeddb.d.ts.map +1 -1
- package/lib/store/indexeddb.js.map +1 -1
- package/lib/sync-accumulator.d.ts +6 -4
- package/lib/sync-accumulator.d.ts.map +1 -1
- package/lib/sync-accumulator.js +23 -12
- package/lib/sync-accumulator.js.map +1 -1
- package/lib/sync.d.ts +10 -13
- package/lib/sync.d.ts.map +1 -1
- package/lib/sync.js +94 -115
- package/lib/sync.js.map +1 -1
- package/lib/testing.d.ts +0 -48
- package/lib/testing.d.ts.map +1 -1
- package/lib/testing.js +0 -105
- package/lib/testing.js.map +1 -1
- package/lib/types.d.ts +0 -1
- package/lib/types.d.ts.map +1 -1
- package/lib/types.js.map +1 -1
- package/package.json +10 -11
- package/src/@types/event.ts +2 -36
- package/src/@types/global.d.ts +21 -4
- package/src/autodiscovery.ts +1 -1
- package/src/base64.ts +38 -40
- package/src/browser-index.ts +0 -11
- package/src/client.ts +68 -3087
- package/src/digest.ts +3 -3
- package/src/embedded.ts +38 -134
- package/src/event-mapper.ts +0 -4
- package/src/matrix.ts +0 -41
- package/src/models/MSC3089Branch.ts +0 -3
- package/src/models/event-timeline-set.ts +17 -38
- package/src/models/event-timeline.ts +10 -5
- package/src/models/event.ts +8 -295
- package/src/models/poll.ts +0 -6
- package/src/models/relations-container.ts +1 -8
- package/src/models/relations.ts +0 -8
- package/src/models/room-state.ts +4 -37
- package/src/models/room.ts +18 -68
- package/src/models/thread.ts +4 -3
- package/src/sliding-sync-sdk.ts +10 -83
- package/src/sliding-sync.ts +6 -6
- package/src/store/indexeddb.ts +1 -1
- package/src/sync-accumulator.ts +33 -16
- package/src/sync.ts +112 -143
- package/src/testing.ts +0 -108
- package/src/types.ts +0 -1
- package/CHANGELOG.md +0 -5910
- package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
- package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
- package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
- package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
- package/lib/@types/crypto.d.ts +0 -47
- package/lib/@types/crypto.d.ts.map +0 -1
- package/lib/@types/crypto.js +0 -1
- package/lib/@types/crypto.js.map +0 -1
- package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
- package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
- package/lib/common-crypto/CryptoBackend.d.ts +0 -240
- package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
- package/lib/common-crypto/CryptoBackend.js +0 -73
- package/lib/common-crypto/CryptoBackend.js.map +0 -1
- package/lib/common-crypto/key-passphrase.d.ts +0 -14
- package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
- package/lib/common-crypto/key-passphrase.js +0 -33
- package/lib/common-crypto/key-passphrase.js.map +0 -1
- package/lib/crypto/CrossSigning.d.ts +0 -184
- package/lib/crypto/CrossSigning.d.ts.map +0 -1
- package/lib/crypto/CrossSigning.js +0 -718
- package/lib/crypto/CrossSigning.js.map +0 -1
- package/lib/crypto/DeviceList.d.ts +0 -216
- package/lib/crypto/DeviceList.d.ts.map +0 -1
- package/lib/crypto/DeviceList.js +0 -892
- package/lib/crypto/DeviceList.js.map +0 -1
- package/lib/crypto/EncryptionSetup.d.ts +0 -152
- package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
- package/lib/crypto/EncryptionSetup.js +0 -356
- package/lib/crypto/EncryptionSetup.js.map +0 -1
- package/lib/crypto/OlmDevice.d.ts +0 -457
- package/lib/crypto/OlmDevice.d.ts.map +0 -1
- package/lib/crypto/OlmDevice.js +0 -1241
- package/lib/crypto/OlmDevice.js.map +0 -1
- package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
- package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
- package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
- package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
- package/lib/crypto/RoomList.d.ts +0 -26
- package/lib/crypto/RoomList.d.ts.map +0 -1
- package/lib/crypto/RoomList.js +0 -71
- package/lib/crypto/RoomList.js.map +0 -1
- package/lib/crypto/SecretSharing.d.ts +0 -24
- package/lib/crypto/SecretSharing.d.ts.map +0 -1
- package/lib/crypto/SecretSharing.js +0 -194
- package/lib/crypto/SecretSharing.js.map +0 -1
- package/lib/crypto/SecretStorage.d.ts +0 -55
- package/lib/crypto/SecretStorage.d.ts.map +0 -1
- package/lib/crypto/SecretStorage.js +0 -118
- package/lib/crypto/SecretStorage.js.map +0 -1
- package/lib/crypto/aes.d.ts +0 -6
- package/lib/crypto/aes.d.ts.map +0 -1
- package/lib/crypto/aes.js +0 -24
- package/lib/crypto/aes.js.map +0 -1
- package/lib/crypto/algorithms/base.d.ts +0 -156
- package/lib/crypto/algorithms/base.d.ts.map +0 -1
- package/lib/crypto/algorithms/base.js +0 -187
- package/lib/crypto/algorithms/base.js.map +0 -1
- package/lib/crypto/algorithms/index.d.ts +0 -4
- package/lib/crypto/algorithms/index.d.ts.map +0 -1
- package/lib/crypto/algorithms/index.js +0 -20
- package/lib/crypto/algorithms/index.js.map +0 -1
- package/lib/crypto/algorithms/megolm.d.ts +0 -385
- package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
- package/lib/crypto/algorithms/megolm.js +0 -1822
- package/lib/crypto/algorithms/megolm.js.map +0 -1
- package/lib/crypto/algorithms/olm.d.ts +0 -5
- package/lib/crypto/algorithms/olm.d.ts.map +0 -1
- package/lib/crypto/algorithms/olm.js +0 -299
- package/lib/crypto/algorithms/olm.js.map +0 -1
- package/lib/crypto/api.d.ts +0 -32
- package/lib/crypto/api.d.ts.map +0 -1
- package/lib/crypto/api.js +0 -22
- package/lib/crypto/api.js.map +0 -1
- package/lib/crypto/backup.d.ts +0 -227
- package/lib/crypto/backup.d.ts.map +0 -1
- package/lib/crypto/backup.js +0 -824
- package/lib/crypto/backup.js.map +0 -1
- package/lib/crypto/crypto.d.ts +0 -3
- package/lib/crypto/crypto.d.ts.map +0 -1
- package/lib/crypto/crypto.js +0 -19
- package/lib/crypto/crypto.js.map +0 -1
- package/lib/crypto/dehydration.d.ts +0 -34
- package/lib/crypto/dehydration.d.ts.map +0 -1
- package/lib/crypto/dehydration.js +0 -252
- package/lib/crypto/dehydration.js.map +0 -1
- package/lib/crypto/device-converter.d.ts +0 -9
- package/lib/crypto/device-converter.d.ts.map +0 -1
- package/lib/crypto/device-converter.js +0 -42
- package/lib/crypto/device-converter.js.map +0 -1
- package/lib/crypto/deviceinfo.d.ts +0 -99
- package/lib/crypto/deviceinfo.d.ts.map +0 -1
- package/lib/crypto/deviceinfo.js +0 -148
- package/lib/crypto/deviceinfo.js.map +0 -1
- package/lib/crypto/index.d.ts +0 -1210
- package/lib/crypto/index.d.ts.map +0 -1
- package/lib/crypto/index.js +0 -4101
- package/lib/crypto/index.js.map +0 -1
- package/lib/crypto/key_passphrase.d.ts +0 -14
- package/lib/crypto/key_passphrase.d.ts.map +0 -1
- package/lib/crypto/key_passphrase.js +0 -44
- package/lib/crypto/key_passphrase.js.map +0 -1
- package/lib/crypto/keybackup.d.ts +0 -18
- package/lib/crypto/keybackup.d.ts.map +0 -1
- package/lib/crypto/keybackup.js +0 -1
- package/lib/crypto/keybackup.js.map +0 -1
- package/lib/crypto/olmlib.d.ts +0 -129
- package/lib/crypto/olmlib.d.ts.map +0 -1
- package/lib/crypto/olmlib.js +0 -492
- package/lib/crypto/olmlib.js.map +0 -1
- package/lib/crypto/recoverykey.d.ts +0 -2
- package/lib/crypto/recoverykey.d.ts.map +0 -1
- package/lib/crypto/recoverykey.js +0 -19
- package/lib/crypto/recoverykey.js.map +0 -1
- package/lib/crypto/store/base.d.ts +0 -252
- package/lib/crypto/store/base.d.ts.map +0 -1
- package/lib/crypto/store/base.js +0 -64
- package/lib/crypto/store/base.js.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
- package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
- package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
- package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
- package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
- package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
- package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/localStorage-crypto-store.js +0 -531
- package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
- package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
- package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/memory-crypto-store.js +0 -622
- package/lib/crypto/store/memory-crypto-store.js.map +0 -1
- package/lib/crypto/verification/Base.d.ts +0 -105
- package/lib/crypto/verification/Base.d.ts.map +0 -1
- package/lib/crypto/verification/Base.js +0 -372
- package/lib/crypto/verification/Base.js.map +0 -1
- package/lib/crypto/verification/Error.d.ts +0 -35
- package/lib/crypto/verification/Error.d.ts.map +0 -1
- package/lib/crypto/verification/Error.js +0 -86
- package/lib/crypto/verification/Error.js.map +0 -1
- package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
- package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
- package/lib/crypto/verification/IllegalMethod.js +0 -43
- package/lib/crypto/verification/IllegalMethod.js.map +0 -1
- package/lib/crypto/verification/QRCode.d.ts +0 -51
- package/lib/crypto/verification/QRCode.d.ts.map +0 -1
- package/lib/crypto/verification/QRCode.js +0 -277
- package/lib/crypto/verification/QRCode.js.map +0 -1
- package/lib/crypto/verification/SAS.d.ts +0 -27
- package/lib/crypto/verification/SAS.d.ts.map +0 -1
- package/lib/crypto/verification/SAS.js +0 -485
- package/lib/crypto/verification/SAS.js.map +0 -1
- package/lib/crypto/verification/SASDecimal.d.ts +0 -8
- package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
- package/lib/crypto/verification/SASDecimal.js +0 -34
- package/lib/crypto/verification/SASDecimal.js.map +0 -1
- package/lib/crypto/verification/request/Channel.d.ts +0 -18
- package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
- package/lib/crypto/verification/request/Channel.js +0 -1
- package/lib/crypto/verification/request/Channel.js.map +0 -1
- package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
- package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
- package/lib/crypto/verification/request/InRoomChannel.js +0 -351
- package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
- package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
- package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
- package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
- package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
- package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
- package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
- package/lib/crypto/verification/request/VerificationRequest.js +0 -937
- package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
- package/lib/crypto-api/CryptoEvent.d.ts +0 -69
- package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
- package/lib/crypto-api/CryptoEvent.js +0 -33
- package/lib/crypto-api/CryptoEvent.js.map +0 -1
- package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
- package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
- package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
- package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
- package/lib/crypto-api/index.d.ts +0 -978
- package/lib/crypto-api/index.d.ts.map +0 -1
- package/lib/crypto-api/index.js +0 -304
- package/lib/crypto-api/index.js.map +0 -1
- package/lib/crypto-api/key-passphrase.d.ts +0 -11
- package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
- package/lib/crypto-api/key-passphrase.js +0 -51
- package/lib/crypto-api/key-passphrase.js.map +0 -1
- package/lib/crypto-api/keybackup.d.ts +0 -88
- package/lib/crypto-api/keybackup.d.ts.map +0 -1
- package/lib/crypto-api/keybackup.js +0 -1
- package/lib/crypto-api/keybackup.js.map +0 -1
- package/lib/crypto-api/recovery-key.d.ts +0 -11
- package/lib/crypto-api/recovery-key.d.ts.map +0 -1
- package/lib/crypto-api/recovery-key.js +0 -65
- package/lib/crypto-api/recovery-key.js.map +0 -1
- package/lib/crypto-api/verification.d.ts +0 -344
- package/lib/crypto-api/verification.d.ts.map +0 -1
- package/lib/crypto-api/verification.js +0 -91
- package/lib/crypto-api/verification.js.map +0 -1
- package/lib/matrixrtc/CallMembership.d.ts +0 -66
- package/lib/matrixrtc/CallMembership.d.ts.map +0 -1
- package/lib/matrixrtc/CallMembership.js +0 -197
- package/lib/matrixrtc/CallMembership.js.map +0 -1
- package/lib/matrixrtc/LivekitFocus.d.ts +0 -16
- package/lib/matrixrtc/LivekitFocus.d.ts.map +0 -1
- package/lib/matrixrtc/LivekitFocus.js +0 -20
- package/lib/matrixrtc/LivekitFocus.js.map +0 -1
- package/lib/matrixrtc/MatrixRTCSession.d.ts +0 -295
- package/lib/matrixrtc/MatrixRTCSession.d.ts.map +0 -1
- package/lib/matrixrtc/MatrixRTCSession.js +0 -1043
- package/lib/matrixrtc/MatrixRTCSession.js.map +0 -1
- package/lib/matrixrtc/MatrixRTCSessionManager.d.ts +0 -40
- package/lib/matrixrtc/MatrixRTCSessionManager.d.ts.map +0 -1
- package/lib/matrixrtc/MatrixRTCSessionManager.js +0 -146
- package/lib/matrixrtc/MatrixRTCSessionManager.js.map +0 -1
- package/lib/matrixrtc/focus.d.ts +0 -10
- package/lib/matrixrtc/focus.d.ts.map +0 -1
- package/lib/matrixrtc/focus.js +0 -1
- package/lib/matrixrtc/focus.js.map +0 -1
- package/lib/matrixrtc/index.d.ts +0 -7
- package/lib/matrixrtc/index.d.ts.map +0 -1
- package/lib/matrixrtc/index.js +0 -21
- package/lib/matrixrtc/index.js.map +0 -1
- package/lib/matrixrtc/types.d.ts +0 -19
- package/lib/matrixrtc/types.d.ts.map +0 -1
- package/lib/matrixrtc/types.js +0 -1
- package/lib/matrixrtc/types.js.map +0 -1
- package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
- package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
- package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
- package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
- package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
- package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousChannel.js +0 -1
- package/lib/rendezvous/RendezvousChannel.js.map +0 -1
- package/lib/rendezvous/RendezvousCode.d.ts +0 -9
- package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousCode.js +0 -1
- package/lib/rendezvous/RendezvousCode.js.map +0 -1
- package/lib/rendezvous/RendezvousError.d.ts +0 -6
- package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousError.js +0 -23
- package/lib/rendezvous/RendezvousError.js.map +0 -1
- package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
- package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousFailureReason.js +0 -38
- package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
- package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
- package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousIntent.js +0 -22
- package/lib/rendezvous/RendezvousIntent.js.map +0 -1
- package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
- package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousTransport.js +0 -1
- package/lib/rendezvous/RendezvousTransport.js.map +0 -1
- package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
- package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
- package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
- package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
- package/lib/rendezvous/channels/index.d.ts +0 -2
- package/lib/rendezvous/channels/index.d.ts.map +0 -1
- package/lib/rendezvous/channels/index.js +0 -18
- package/lib/rendezvous/channels/index.js.map +0 -1
- package/lib/rendezvous/index.d.ts +0 -10
- package/lib/rendezvous/index.d.ts.map +0 -1
- package/lib/rendezvous/index.js +0 -23
- package/lib/rendezvous/index.js.map +0 -1
- package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
- package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
- package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
- package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
- package/lib/rendezvous/transports/index.d.ts +0 -2
- package/lib/rendezvous/transports/index.d.ts.map +0 -1
- package/lib/rendezvous/transports/index.js +0 -18
- package/lib/rendezvous/transports/index.js.map +0 -1
- package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
- package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
- package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
- package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
- package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
- package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
- package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
- package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
- package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
- package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
- package/lib/rust-crypto/KeyClaimManager.js +0 -82
- package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
- package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
- package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
- package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
- package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
- package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
- package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
- package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
- package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
- package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
- package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
- package/lib/rust-crypto/RoomEncryptor.js +0 -299
- package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
- package/lib/rust-crypto/backup.d.ts +0 -254
- package/lib/rust-crypto/backup.d.ts.map +0 -1
- package/lib/rust-crypto/backup.js +0 -837
- package/lib/rust-crypto/backup.js.map +0 -1
- package/lib/rust-crypto/constants.d.ts +0 -3
- package/lib/rust-crypto/constants.d.ts.map +0 -1
- package/lib/rust-crypto/constants.js +0 -19
- package/lib/rust-crypto/constants.js.map +0 -1
- package/lib/rust-crypto/device-converter.d.ts +0 -28
- package/lib/rust-crypto/device-converter.d.ts.map +0 -1
- package/lib/rust-crypto/device-converter.js +0 -123
- package/lib/rust-crypto/device-converter.js.map +0 -1
- package/lib/rust-crypto/index.d.ts +0 -61
- package/lib/rust-crypto/index.d.ts.map +0 -1
- package/lib/rust-crypto/index.js +0 -152
- package/lib/rust-crypto/index.js.map +0 -1
- package/lib/rust-crypto/libolm_migration.d.ts +0 -81
- package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
- package/lib/rust-crypto/libolm_migration.js +0 -459
- package/lib/rust-crypto/libolm_migration.js.map +0 -1
- package/lib/rust-crypto/rust-crypto.d.ts +0 -556
- package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
- package/lib/rust-crypto/rust-crypto.js +0 -2016
- package/lib/rust-crypto/rust-crypto.js.map +0 -1
- package/lib/rust-crypto/secret-storage.d.ts +0 -22
- package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
- package/lib/rust-crypto/secret-storage.js +0 -63
- package/lib/rust-crypto/secret-storage.js.map +0 -1
- package/lib/rust-crypto/verification.d.ts +0 -319
- package/lib/rust-crypto/verification.d.ts.map +0 -1
- package/lib/rust-crypto/verification.js +0 -816
- package/lib/rust-crypto/verification.js.map +0 -1
- package/lib/secret-storage.d.ts +0 -370
- package/lib/secret-storage.d.ts.map +0 -1
- package/lib/secret-storage.js +0 -466
- package/lib/secret-storage.js.map +0 -1
- package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
- package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
- package/lib/utils/decryptAESSecretStorageItem.js +0 -50
- package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
- package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
- package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
- package/lib/utils/encryptAESSecretStorageItem.js +0 -68
- package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
- package/lib/utils/internal/deriveKeys.d.ts +0 -10
- package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
- package/lib/utils/internal/deriveKeys.js +0 -60
- package/lib/utils/internal/deriveKeys.js.map +0 -1
- package/lib/webrtc/audioContext.d.ts +0 -15
- package/lib/webrtc/audioContext.d.ts.map +0 -1
- package/lib/webrtc/audioContext.js +0 -46
- package/lib/webrtc/audioContext.js.map +0 -1
- package/lib/webrtc/call.d.ts +0 -560
- package/lib/webrtc/call.d.ts.map +0 -1
- package/lib/webrtc/call.js +0 -2541
- package/lib/webrtc/call.js.map +0 -1
- package/lib/webrtc/callEventHandler.d.ts +0 -37
- package/lib/webrtc/callEventHandler.d.ts.map +0 -1
- package/lib/webrtc/callEventHandler.js +0 -344
- package/lib/webrtc/callEventHandler.js.map +0 -1
- package/lib/webrtc/callEventTypes.d.ts +0 -73
- package/lib/webrtc/callEventTypes.d.ts.map +0 -1
- package/lib/webrtc/callEventTypes.js +0 -13
- package/lib/webrtc/callEventTypes.js.map +0 -1
- package/lib/webrtc/callFeed.d.ts +0 -128
- package/lib/webrtc/callFeed.d.ts.map +0 -1
- package/lib/webrtc/callFeed.js +0 -289
- package/lib/webrtc/callFeed.js.map +0 -1
- package/lib/webrtc/groupCall.d.ts +0 -323
- package/lib/webrtc/groupCall.d.ts.map +0 -1
- package/lib/webrtc/groupCall.js +0 -1337
- package/lib/webrtc/groupCall.js.map +0 -1
- package/lib/webrtc/groupCallEventHandler.d.ts +0 -31
- package/lib/webrtc/groupCallEventHandler.d.ts.map +0 -1
- package/lib/webrtc/groupCallEventHandler.js +0 -178
- package/lib/webrtc/groupCallEventHandler.js.map +0 -1
- package/lib/webrtc/mediaHandler.d.ts +0 -89
- package/lib/webrtc/mediaHandler.d.ts.map +0 -1
- package/lib/webrtc/mediaHandler.js +0 -437
- package/lib/webrtc/mediaHandler.js.map +0 -1
- package/lib/webrtc/stats/callFeedStatsReporter.d.ts +0 -8
- package/lib/webrtc/stats/callFeedStatsReporter.d.ts.map +0 -1
- package/lib/webrtc/stats/callFeedStatsReporter.js +0 -82
- package/lib/webrtc/stats/callFeedStatsReporter.js.map +0 -1
- package/lib/webrtc/stats/callStatsReportGatherer.d.ts +0 -25
- package/lib/webrtc/stats/callStatsReportGatherer.d.ts.map +0 -1
- package/lib/webrtc/stats/callStatsReportGatherer.js +0 -199
- package/lib/webrtc/stats/callStatsReportGatherer.js.map +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.d.ts +0 -17
- package/lib/webrtc/stats/callStatsReportSummary.d.ts.map +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.js +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.js.map +0 -1
- package/lib/webrtc/stats/connectionStats.d.ts +0 -28
- package/lib/webrtc/stats/connectionStats.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStats.js +0 -26
- package/lib/webrtc/stats/connectionStats.js.map +0 -1
- package/lib/webrtc/stats/connectionStatsBuilder.d.ts +0 -5
- package/lib/webrtc/stats/connectionStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStatsBuilder.js +0 -27
- package/lib/webrtc/stats/connectionStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts +0 -7
- package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStatsReportBuilder.js +0 -121
- package/lib/webrtc/stats/connectionStatsReportBuilder.js.map +0 -1
- package/lib/webrtc/stats/groupCallStats.d.ts +0 -22
- package/lib/webrtc/stats/groupCallStats.d.ts.map +0 -1
- package/lib/webrtc/stats/groupCallStats.js +0 -78
- package/lib/webrtc/stats/groupCallStats.js.map +0 -1
- package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts +0 -10
- package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaSsrcHandler.js +0 -57
- package/lib/webrtc/stats/media/mediaSsrcHandler.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackHandler.d.ts +0 -12
- package/lib/webrtc/stats/media/mediaTrackHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackHandler.js +0 -62
- package/lib/webrtc/stats/media/mediaTrackHandler.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStats.d.ts +0 -86
- package/lib/webrtc/stats/media/mediaTrackStats.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStats.js +0 -142
- package/lib/webrtc/stats/media/mediaTrackStats.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts +0 -22
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.js +0 -76
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.js.map +0 -1
- package/lib/webrtc/stats/statsReport.d.ts +0 -99
- package/lib/webrtc/stats/statsReport.d.ts.map +0 -1
- package/lib/webrtc/stats/statsReport.js +0 -32
- package/lib/webrtc/stats/statsReport.js.map +0 -1
- package/lib/webrtc/stats/statsReportEmitter.d.ts +0 -15
- package/lib/webrtc/stats/statsReportEmitter.d.ts.map +0 -1
- package/lib/webrtc/stats/statsReportEmitter.js +0 -33
- package/lib/webrtc/stats/statsReportEmitter.js.map +0 -1
- package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts +0 -16
- package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts.map +0 -1
- package/lib/webrtc/stats/summaryStatsReportGatherer.js +0 -116
- package/lib/webrtc/stats/summaryStatsReportGatherer.js.map +0 -1
- package/lib/webrtc/stats/trackStatsBuilder.d.ts +0 -19
- package/lib/webrtc/stats/trackStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/trackStatsBuilder.js +0 -168
- package/lib/webrtc/stats/trackStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/transportStats.d.ts +0 -11
- package/lib/webrtc/stats/transportStats.d.ts.map +0 -1
- package/lib/webrtc/stats/transportStats.js +0 -1
- package/lib/webrtc/stats/transportStats.js.map +0 -1
- package/lib/webrtc/stats/transportStatsBuilder.d.ts +0 -5
- package/lib/webrtc/stats/transportStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/transportStatsBuilder.js +0 -34
- package/lib/webrtc/stats/transportStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/valueFormatter.d.ts +0 -4
- package/lib/webrtc/stats/valueFormatter.d.ts.map +0 -1
- package/lib/webrtc/stats/valueFormatter.js +0 -25
- package/lib/webrtc/stats/valueFormatter.js.map +0 -1
- package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
- package/src/@types/crypto.ts +0 -73
- package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
- package/src/common-crypto/CryptoBackend.ts +0 -302
- package/src/common-crypto/README.md +0 -4
- package/src/common-crypto/key-passphrase.ts +0 -43
- package/src/crypto/CrossSigning.ts +0 -773
- package/src/crypto/DeviceList.ts +0 -989
- package/src/crypto/EncryptionSetup.ts +0 -351
- package/src/crypto/OlmDevice.ts +0 -1500
- package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
- package/src/crypto/RoomList.ts +0 -70
- package/src/crypto/SecretSharing.ts +0 -240
- package/src/crypto/SecretStorage.ts +0 -136
- package/src/crypto/aes.ts +0 -23
- package/src/crypto/algorithms/base.ts +0 -236
- package/src/crypto/algorithms/index.ts +0 -20
- package/src/crypto/algorithms/megolm.ts +0 -2216
- package/src/crypto/algorithms/olm.ts +0 -381
- package/src/crypto/api.ts +0 -70
- package/src/crypto/backup.ts +0 -922
- package/src/crypto/crypto.ts +0 -18
- package/src/crypto/dehydration.ts +0 -272
- package/src/crypto/device-converter.ts +0 -45
- package/src/crypto/deviceinfo.ts +0 -158
- package/src/crypto/index.ts +0 -4418
- package/src/crypto/key_passphrase.ts +0 -42
- package/src/crypto/keybackup.ts +0 -47
- package/src/crypto/olmlib.ts +0 -539
- package/src/crypto/recoverykey.ts +0 -18
- package/src/crypto/store/base.ts +0 -348
- package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
- package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
- package/src/crypto/store/localStorage-crypto-store.ts +0 -579
- package/src/crypto/store/memory-crypto-store.ts +0 -680
- package/src/crypto/verification/Base.ts +0 -409
- package/src/crypto/verification/Error.ts +0 -76
- package/src/crypto/verification/IllegalMethod.ts +0 -50
- package/src/crypto/verification/QRCode.ts +0 -310
- package/src/crypto/verification/SAS.ts +0 -494
- package/src/crypto/verification/SASDecimal.ts +0 -37
- package/src/crypto/verification/request/Channel.ts +0 -34
- package/src/crypto/verification/request/InRoomChannel.ts +0 -371
- package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
- package/src/crypto/verification/request/VerificationRequest.ts +0 -976
- package/src/crypto-api/CryptoEvent.ts +0 -93
- package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
- package/src/crypto-api/index.ts +0 -1175
- package/src/crypto-api/key-passphrase.ts +0 -58
- package/src/crypto-api/keybackup.ts +0 -115
- package/src/crypto-api/recovery-key.ts +0 -69
- package/src/crypto-api/verification.ts +0 -408
- package/src/matrixrtc/CallMembership.ts +0 -247
- package/src/matrixrtc/LivekitFocus.ts +0 -39
- package/src/matrixrtc/MatrixRTCSession.ts +0 -1319
- package/src/matrixrtc/MatrixRTCSessionManager.ts +0 -166
- package/src/matrixrtc/focus.ts +0 -25
- package/src/matrixrtc/index.ts +0 -22
- package/src/matrixrtc/types.ts +0 -36
- package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
- package/src/rendezvous/RendezvousChannel.ts +0 -48
- package/src/rendezvous/RendezvousCode.ts +0 -25
- package/src/rendezvous/RendezvousError.ts +0 -26
- package/src/rendezvous/RendezvousFailureReason.ts +0 -49
- package/src/rendezvous/RendezvousIntent.ts +0 -20
- package/src/rendezvous/RendezvousTransport.ts +0 -58
- package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
- package/src/rendezvous/channels/index.ts +0 -17
- package/src/rendezvous/index.ts +0 -25
- package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
- package/src/rendezvous/transports/index.ts +0 -17
- package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
- package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
- package/src/rust-crypto/KeyClaimManager.ts +0 -86
- package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
- package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
- package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
- package/src/rust-crypto/RoomEncryptor.ts +0 -352
- package/src/rust-crypto/backup.ts +0 -881
- package/src/rust-crypto/constants.ts +0 -18
- package/src/rust-crypto/device-converter.ts +0 -128
- package/src/rust-crypto/index.ts +0 -237
- package/src/rust-crypto/libolm_migration.ts +0 -530
- package/src/rust-crypto/rust-crypto.ts +0 -2205
- package/src/rust-crypto/secret-storage.ts +0 -60
- package/src/rust-crypto/verification.ts +0 -830
- package/src/secret-storage.ts +0 -693
- package/src/utils/decryptAESSecretStorageItem.ts +0 -54
- package/src/utils/encryptAESSecretStorageItem.ts +0 -73
- package/src/utils/internal/deriveKeys.ts +0 -63
- package/src/webrtc/audioContext.ts +0 -44
- package/src/webrtc/call.ts +0 -3074
- package/src/webrtc/callEventHandler.ts +0 -425
- package/src/webrtc/callEventTypes.ts +0 -93
- package/src/webrtc/callFeed.ts +0 -364
- package/src/webrtc/groupCall.ts +0 -1735
- package/src/webrtc/groupCallEventHandler.ts +0 -234
- package/src/webrtc/mediaHandler.ts +0 -484
- package/src/webrtc/stats/callFeedStatsReporter.ts +0 -94
- package/src/webrtc/stats/callStatsReportGatherer.ts +0 -219
- package/src/webrtc/stats/callStatsReportSummary.ts +0 -30
- package/src/webrtc/stats/connectionStats.ts +0 -47
- package/src/webrtc/stats/connectionStatsBuilder.ts +0 -28
- package/src/webrtc/stats/connectionStatsReportBuilder.ts +0 -140
- package/src/webrtc/stats/groupCallStats.ts +0 -93
- package/src/webrtc/stats/media/mediaSsrcHandler.ts +0 -57
- package/src/webrtc/stats/media/mediaTrackHandler.ts +0 -76
- package/src/webrtc/stats/media/mediaTrackStats.ts +0 -176
- package/src/webrtc/stats/media/mediaTrackStatsHandler.ts +0 -90
- package/src/webrtc/stats/statsReport.ts +0 -133
- package/src/webrtc/stats/statsReportEmitter.ts +0 -49
- package/src/webrtc/stats/summaryStatsReportGatherer.ts +0 -148
- package/src/webrtc/stats/trackStatsBuilder.ts +0 -207
- package/src/webrtc/stats/transportStats.ts +0 -26
- package/src/webrtc/stats/transportStatsBuilder.ts +0 -48
- package/src/webrtc/stats/valueFormatter.ts +0 -27
@@ -1,2016 +0,0 @@
|
|
1
|
-
import _asyncToGenerator from "@babel/runtime/helpers/asyncToGenerator";
|
2
|
-
import _defineProperty from "@babel/runtime/helpers/defineProperty";
|
3
|
-
function ownKeys(e, r) { var t = Object.keys(e); if (Object.getOwnPropertySymbols) { var o = Object.getOwnPropertySymbols(e); r && (o = o.filter(function (r) { return Object.getOwnPropertyDescriptor(e, r).enumerable; })), t.push.apply(t, o); } return t; }
|
4
|
-
function _objectSpread(e) { for (var r = 1; r < arguments.length; r++) { var t = null != arguments[r] ? arguments[r] : {}; r % 2 ? ownKeys(Object(t), !0).forEach(function (r) { _defineProperty(e, r, t[r]); }) : Object.getOwnPropertyDescriptors ? Object.defineProperties(e, Object.getOwnPropertyDescriptors(t)) : ownKeys(Object(t)).forEach(function (r) { Object.defineProperty(e, r, Object.getOwnPropertyDescriptor(t, r)); }); } return e; }
|
5
|
-
/*
|
6
|
-
Copyright 2022-2023 The Matrix.org Foundation C.I.C.
|
7
|
-
|
8
|
-
Licensed under the Apache License, Version 2.0 (the "License");
|
9
|
-
you may not use this file except in compliance with the License.
|
10
|
-
You may obtain a copy of the License at
|
11
|
-
|
12
|
-
http://www.apache.org/licenses/LICENSE-2.0
|
13
|
-
|
14
|
-
Unless required by applicable law or agreed to in writing, software
|
15
|
-
distributed under the License is distributed on an "AS IS" BASIS,
|
16
|
-
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
17
|
-
See the License for the specific language governing permissions and
|
18
|
-
limitations under the License.
|
19
|
-
*/
|
20
|
-
|
21
|
-
import anotherjson from "another-json";
|
22
|
-
import * as RustSdkCryptoJs from "@matrix-org/matrix-sdk-crypto-wasm";
|
23
|
-
import { KnownMembership } from "../@types/membership.js";
|
24
|
-
import { MatrixEventEvent } from "../models/event.js";
|
25
|
-
import { DecryptionError } from "../common-crypto/CryptoBackend.js";
|
26
|
-
import { logger, LogSpan } from "../logger.js";
|
27
|
-
import { Method } from "../http-api/index.js";
|
28
|
-
import { RoomEncryptor } from "./RoomEncryptor.js";
|
29
|
-
import { OutgoingRequestProcessor } from "./OutgoingRequestProcessor.js";
|
30
|
-
import { KeyClaimManager } from "./KeyClaimManager.js";
|
31
|
-
import { logDuration, MapWithDefault } from "../utils.js";
|
32
|
-
import { CrossSigningKey, DecryptionFailureCode, DeviceVerificationStatus, EventShieldColour, EventShieldReason, UserVerificationStatus, encodeRecoveryKey, deriveRecoveryKeyFromPassphrase, AllDevicesIsolationMode, DeviceIsolationModeKind, CryptoEvent } from "../crypto-api/index.js";
|
33
|
-
import { deviceKeysToDeviceMap, rustDeviceToJsDevice } from "./device-converter.js";
|
34
|
-
import { SECRET_STORAGE_ALGORITHM_V1_AES } from "../secret-storage.js";
|
35
|
-
import { CrossSigningIdentity } from "./CrossSigningIdentity.js";
|
36
|
-
import { secretStorageCanAccessSecrets, secretStorageContainsCrossSigningKeys } from "./secret-storage.js";
|
37
|
-
import { isVerificationEvent, RustVerificationRequest, verificationMethodIdentifierToMethod } from "./verification.js";
|
38
|
-
import { EventType, MsgType } from "../@types/event.js";
|
39
|
-
import { TypedEventEmitter } from "../models/typed-event-emitter.js";
|
40
|
-
import { decryptionKeyMatchesKeyBackupInfo, RustBackupManager } from "./backup.js";
|
41
|
-
import { TypedReEmitter } from "../ReEmitter.js";
|
42
|
-
import { randomString } from "../randomstring.js";
|
43
|
-
import { ClientStoppedError } from "../errors.js";
|
44
|
-
import { decodeBase64, encodeBase64 } from "../base64.js";
|
45
|
-
import { OutgoingRequestsManager } from "./OutgoingRequestsManager.js";
|
46
|
-
import { PerSessionKeyBackupDownloader } from "./PerSessionKeyBackupDownloader.js";
|
47
|
-
import { DehydratedDeviceManager } from "./DehydratedDeviceManager.js";
|
48
|
-
import { VerificationMethod } from "../types.js";
|
49
|
-
import { keyFromAuthData } from "../common-crypto/key-passphrase.js";
|
50
|
-
var ALL_VERIFICATION_METHODS = [VerificationMethod.Sas, VerificationMethod.ScanQrCode, VerificationMethod.ShowQrCode, VerificationMethod.Reciprocate];
|
51
|
-
/**
|
52
|
-
* An implementation of {@link CryptoBackend} using the Rust matrix-sdk-crypto.
|
53
|
-
*
|
54
|
-
* @internal
|
55
|
-
*/
|
56
|
-
export class RustCrypto extends TypedEventEmitter {
|
57
|
-
constructor(logger, /** The `OlmMachine` from the underlying rust crypto sdk. */
|
58
|
-
olmMachine,
|
59
|
-
/**
|
60
|
-
* Low-level HTTP interface: used to make outgoing requests required by the rust SDK.
|
61
|
-
*
|
62
|
-
* We expect it to set the access token, etc.
|
63
|
-
*/
|
64
|
-
http, /** The local user's User ID. */
|
65
|
-
userId, /** The local user's Device ID. */
|
66
|
-
_deviceId, /** Interface to server-side secret storage */
|
67
|
-
secretStorage, /** Crypto callbacks provided by the application */
|
68
|
-
cryptoCallbacks) {
|
69
|
-
super();
|
70
|
-
this.logger = logger;
|
71
|
-
this.olmMachine = olmMachine;
|
72
|
-
this.http = http;
|
73
|
-
this.userId = userId;
|
74
|
-
this.secretStorage = secretStorage;
|
75
|
-
this.cryptoCallbacks = cryptoCallbacks;
|
76
|
-
/**
|
77
|
-
* The number of iterations to use when deriving a recovery key from a passphrase.
|
78
|
-
*/
|
79
|
-
_defineProperty(this, "RECOVERY_KEY_DERIVATION_ITERATIONS", 500000);
|
80
|
-
_defineProperty(this, "_trustCrossSignedDevices", true);
|
81
|
-
_defineProperty(this, "deviceIsolationMode", new AllDevicesIsolationMode(false));
|
82
|
-
/** whether {@link stop} has been called */
|
83
|
-
_defineProperty(this, "stopped", false);
|
84
|
-
/** mapping of roomId → encryptor class */
|
85
|
-
_defineProperty(this, "roomEncryptors", {});
|
86
|
-
_defineProperty(this, "eventDecryptor", void 0);
|
87
|
-
_defineProperty(this, "keyClaimManager", void 0);
|
88
|
-
_defineProperty(this, "outgoingRequestProcessor", void 0);
|
89
|
-
_defineProperty(this, "crossSigningIdentity", void 0);
|
90
|
-
_defineProperty(this, "backupManager", void 0);
|
91
|
-
_defineProperty(this, "outgoingRequestsManager", void 0);
|
92
|
-
_defineProperty(this, "perSessionBackupDownloader", void 0);
|
93
|
-
_defineProperty(this, "dehydratedDeviceManager", void 0);
|
94
|
-
_defineProperty(this, "reemitter", new TypedReEmitter(this));
|
95
|
-
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
|
96
|
-
//
|
97
|
-
// CryptoApi implementation
|
98
|
-
//
|
99
|
-
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
|
100
|
-
_defineProperty(this, "globalBlacklistUnverifiedDevices", false);
|
101
|
-
/**
|
102
|
-
* The verification methods we offer to the other side during an interactive verification.
|
103
|
-
*/
|
104
|
-
_defineProperty(this, "_supportedVerificationMethods", ALL_VERIFICATION_METHODS);
|
105
|
-
this.outgoingRequestProcessor = new OutgoingRequestProcessor(olmMachine, http);
|
106
|
-
this.outgoingRequestsManager = new OutgoingRequestsManager(this.logger, olmMachine, this.outgoingRequestProcessor);
|
107
|
-
this.keyClaimManager = new KeyClaimManager(olmMachine, this.outgoingRequestProcessor);
|
108
|
-
this.backupManager = new RustBackupManager(olmMachine, http, this.outgoingRequestProcessor);
|
109
|
-
this.perSessionBackupDownloader = new PerSessionKeyBackupDownloader(this.logger, this.olmMachine, this.http, this.backupManager);
|
110
|
-
this.dehydratedDeviceManager = new DehydratedDeviceManager(this.logger, olmMachine, http, this.outgoingRequestProcessor, secretStorage);
|
111
|
-
this.eventDecryptor = new EventDecryptor(this.logger, olmMachine, this.perSessionBackupDownloader);
|
112
|
-
this.reemitter.reEmit(this.backupManager, [CryptoEvent.KeyBackupStatus, CryptoEvent.KeyBackupSessionsRemaining, CryptoEvent.KeyBackupFailed, CryptoEvent.KeyBackupDecryptionKeyCached]);
|
113
|
-
this.crossSigningIdentity = new CrossSigningIdentity(olmMachine, this.outgoingRequestProcessor, secretStorage);
|
114
|
-
|
115
|
-
// Check and start in background the key backup connection
|
116
|
-
this.checkKeyBackupAndEnable();
|
117
|
-
}
|
118
|
-
|
119
|
-
/**
|
120
|
-
* Return the OlmMachine only if {@link RustCrypto#stop} has not been called.
|
121
|
-
*
|
122
|
-
* This allows us to better handle race conditions where the client is stopped before or during a crypto API call.
|
123
|
-
*
|
124
|
-
* @throws ClientStoppedError if {@link RustCrypto#stop} has been called.
|
125
|
-
*/
|
126
|
-
getOlmMachineOrThrow() {
|
127
|
-
if (this.stopped) {
|
128
|
-
throw new ClientStoppedError();
|
129
|
-
}
|
130
|
-
return this.olmMachine;
|
131
|
-
}
|
132
|
-
|
133
|
-
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
|
134
|
-
//
|
135
|
-
// CryptoBackend implementation
|
136
|
-
//
|
137
|
-
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
|
138
|
-
|
139
|
-
set globalErrorOnUnknownDevices(_v) {
|
140
|
-
// Not implemented for rust crypto.
|
141
|
-
}
|
142
|
-
get globalErrorOnUnknownDevices() {
|
143
|
-
// Not implemented for rust crypto.
|
144
|
-
return false;
|
145
|
-
}
|
146
|
-
stop() {
|
147
|
-
// stop() may be called multiple times, but attempting to close() the OlmMachine twice
|
148
|
-
// will cause an error.
|
149
|
-
if (this.stopped) {
|
150
|
-
return;
|
151
|
-
}
|
152
|
-
this.stopped = true;
|
153
|
-
this.keyClaimManager.stop();
|
154
|
-
this.backupManager.stop();
|
155
|
-
this.outgoingRequestsManager.stop();
|
156
|
-
this.perSessionBackupDownloader.stop();
|
157
|
-
this.dehydratedDeviceManager.stop();
|
158
|
-
|
159
|
-
// make sure we close() the OlmMachine; doing so means that all the Rust objects will be
|
160
|
-
// cleaned up; in particular, the indexeddb connections will be closed, which means they
|
161
|
-
// can then be deleted.
|
162
|
-
this.olmMachine.close();
|
163
|
-
}
|
164
|
-
encryptEvent(event, _room) {
|
165
|
-
var _this = this;
|
166
|
-
return _asyncToGenerator(function* () {
|
167
|
-
var roomId = event.getRoomId();
|
168
|
-
var encryptor = _this.roomEncryptors[roomId];
|
169
|
-
if (!encryptor) {
|
170
|
-
throw new Error("Cannot encrypt event in unconfigured room ".concat(roomId));
|
171
|
-
}
|
172
|
-
yield encryptor.encryptEvent(event, _this.globalBlacklistUnverifiedDevices, _this.deviceIsolationMode);
|
173
|
-
})();
|
174
|
-
}
|
175
|
-
decryptEvent(event) {
|
176
|
-
var _this2 = this;
|
177
|
-
return _asyncToGenerator(function* () {
|
178
|
-
var roomId = event.getRoomId();
|
179
|
-
if (!roomId) {
|
180
|
-
// presumably, a to-device message. These are normally decrypted in preprocessToDeviceMessages
|
181
|
-
// so the fact it has come back here suggests that decryption failed.
|
182
|
-
//
|
183
|
-
// once we drop support for the libolm crypto implementation, we can stop passing to-device messages
|
184
|
-
// through decryptEvent and hence get rid of this case.
|
185
|
-
throw new Error("to-device event was not decrypted in preprocessToDeviceMessages");
|
186
|
-
}
|
187
|
-
return yield _this2.eventDecryptor.attemptEventDecryption(event, _this2.deviceIsolationMode);
|
188
|
-
})();
|
189
|
-
}
|
190
|
-
|
191
|
-
/**
|
192
|
-
* Implementation of (deprecated) {@link MatrixClient#getEventEncryptionInfo}.
|
193
|
-
*
|
194
|
-
* @param event - event to inspect
|
195
|
-
*/
|
196
|
-
getEventEncryptionInfo(event) {
|
197
|
-
var _event$getSenderKey;
|
198
|
-
var ret = {};
|
199
|
-
ret.senderKey = (_event$getSenderKey = event.getSenderKey()) !== null && _event$getSenderKey !== void 0 ? _event$getSenderKey : undefined;
|
200
|
-
ret.algorithm = event.getWireContent().algorithm;
|
201
|
-
if (!ret.senderKey || !ret.algorithm) {
|
202
|
-
ret.encrypted = false;
|
203
|
-
return ret;
|
204
|
-
}
|
205
|
-
ret.encrypted = true;
|
206
|
-
ret.authenticated = true;
|
207
|
-
ret.mismatchedSender = true;
|
208
|
-
return ret;
|
209
|
-
}
|
210
|
-
|
211
|
-
/**
|
212
|
-
* Implementation of {@link CryptoBackend#checkUserTrust}.
|
213
|
-
*
|
214
|
-
* Stub for backwards compatibility.
|
215
|
-
*
|
216
|
-
*/
|
217
|
-
checkUserTrust(userId) {
|
218
|
-
return new UserVerificationStatus(false, false, false);
|
219
|
-
}
|
220
|
-
|
221
|
-
/**
|
222
|
-
* Get the cross signing information for a given user.
|
223
|
-
*
|
224
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
225
|
-
*
|
226
|
-
* @param userId - the user ID to get the cross-signing info for.
|
227
|
-
*
|
228
|
-
* @returns the cross signing information for the user.
|
229
|
-
*/
|
230
|
-
getStoredCrossSigningForUser(userId) {
|
231
|
-
// TODO
|
232
|
-
return null;
|
233
|
-
}
|
234
|
-
|
235
|
-
/**
|
236
|
-
* This function is unneeded for the rust-crypto.
|
237
|
-
* The cross signing key import and the device verification are done in {@link CryptoApi#bootstrapCrossSigning}
|
238
|
-
*
|
239
|
-
* The function is stub to keep the compatibility with the old crypto.
|
240
|
-
* More information: https://github.com/vector-im/element-web/issues/25648
|
241
|
-
*
|
242
|
-
* Implementation of {@link CryptoBackend#checkOwnCrossSigningTrust}
|
243
|
-
*/
|
244
|
-
checkOwnCrossSigningTrust() {
|
245
|
-
return _asyncToGenerator(function* () {
|
246
|
-
return;
|
247
|
-
})();
|
248
|
-
}
|
249
|
-
|
250
|
-
/**
|
251
|
-
* Implementation of {@link CryptoBackend#getBackupDecryptor}.
|
252
|
-
*/
|
253
|
-
getBackupDecryptor(backupInfo, privKey) {
|
254
|
-
var _this3 = this;
|
255
|
-
return _asyncToGenerator(function* () {
|
256
|
-
if (!(privKey instanceof Uint8Array)) {
|
257
|
-
throw new Error("getBackupDecryptor: expects Uint8Array");
|
258
|
-
}
|
259
|
-
if (backupInfo.algorithm != "m.megolm_backup.v1.curve25519-aes-sha2") {
|
260
|
-
throw new Error("getBackupDecryptor: Unsupported algorithm ".concat(backupInfo.algorithm));
|
261
|
-
}
|
262
|
-
var backupDecryptionKey = RustSdkCryptoJs.BackupDecryptionKey.fromBase64(encodeBase64(privKey));
|
263
|
-
if (!decryptionKeyMatchesKeyBackupInfo(backupDecryptionKey, backupInfo)) {
|
264
|
-
throw new Error("getBackupDecryptor: key backup on server does not match the decryption key");
|
265
|
-
}
|
266
|
-
return _this3.backupManager.createBackupDecryptor(backupDecryptionKey);
|
267
|
-
})();
|
268
|
-
}
|
269
|
-
|
270
|
-
/**
|
271
|
-
* Implementation of {@link CryptoBackend#importBackedUpRoomKeys}.
|
272
|
-
*/
|
273
|
-
importBackedUpRoomKeys(keys, backupVersion, opts) {
|
274
|
-
var _this4 = this;
|
275
|
-
return _asyncToGenerator(function* () {
|
276
|
-
return yield _this4.backupManager.importBackedUpRoomKeys(keys, backupVersion, opts);
|
277
|
-
})();
|
278
|
-
}
|
279
|
-
/**
|
280
|
-
* Implementation of {@link CryptoApi#getVersion}.
|
281
|
-
*/
|
282
|
-
getVersion() {
|
283
|
-
var versions = RustSdkCryptoJs.getVersions();
|
284
|
-
return "Rust SDK ".concat(versions.matrix_sdk_crypto, " (").concat(versions.git_sha, "), Vodozemac ").concat(versions.vodozemac);
|
285
|
-
}
|
286
|
-
|
287
|
-
/**
|
288
|
-
* Implementation of {@link CryptoApi#setDeviceIsolationMode}.
|
289
|
-
*/
|
290
|
-
setDeviceIsolationMode(isolationMode) {
|
291
|
-
this.deviceIsolationMode = isolationMode;
|
292
|
-
}
|
293
|
-
|
294
|
-
/**
|
295
|
-
* Implementation of {@link CryptoApi#isEncryptionEnabledInRoom}.
|
296
|
-
*/
|
297
|
-
isEncryptionEnabledInRoom(roomId) {
|
298
|
-
var _this5 = this;
|
299
|
-
return _asyncToGenerator(function* () {
|
300
|
-
var roomSettings = yield _this5.olmMachine.getRoomSettings(new RustSdkCryptoJs.RoomId(roomId));
|
301
|
-
return Boolean(roomSettings === null || roomSettings === void 0 ? void 0 : roomSettings.algorithm);
|
302
|
-
})();
|
303
|
-
}
|
304
|
-
|
305
|
-
/**
|
306
|
-
* Implementation of {@link CryptoApi#getOwnDeviceKeys}.
|
307
|
-
*/
|
308
|
-
getOwnDeviceKeys() {
|
309
|
-
var _this6 = this;
|
310
|
-
return _asyncToGenerator(function* () {
|
311
|
-
var keys = _this6.olmMachine.identityKeys;
|
312
|
-
return {
|
313
|
-
ed25519: keys.ed25519.toBase64(),
|
314
|
-
curve25519: keys.curve25519.toBase64()
|
315
|
-
};
|
316
|
-
})();
|
317
|
-
}
|
318
|
-
prepareToEncrypt(room) {
|
319
|
-
var encryptor = this.roomEncryptors[room.roomId];
|
320
|
-
if (encryptor) {
|
321
|
-
encryptor.prepareForEncryption(this.globalBlacklistUnverifiedDevices, this.deviceIsolationMode);
|
322
|
-
}
|
323
|
-
}
|
324
|
-
forceDiscardSession(roomId) {
|
325
|
-
var _this$roomEncryptors$;
|
326
|
-
return (_this$roomEncryptors$ = this.roomEncryptors[roomId]) === null || _this$roomEncryptors$ === void 0 ? void 0 : _this$roomEncryptors$.forceDiscardSession();
|
327
|
-
}
|
328
|
-
exportRoomKeys() {
|
329
|
-
var _this7 = this;
|
330
|
-
return _asyncToGenerator(function* () {
|
331
|
-
var raw = yield _this7.olmMachine.exportRoomKeys(() => true);
|
332
|
-
return JSON.parse(raw);
|
333
|
-
})();
|
334
|
-
}
|
335
|
-
exportRoomKeysAsJson() {
|
336
|
-
var _this8 = this;
|
337
|
-
return _asyncToGenerator(function* () {
|
338
|
-
return yield _this8.olmMachine.exportRoomKeys(() => true);
|
339
|
-
})();
|
340
|
-
}
|
341
|
-
importRoomKeys(keys, opts) {
|
342
|
-
var _this9 = this;
|
343
|
-
return _asyncToGenerator(function* () {
|
344
|
-
return yield _this9.backupManager.importRoomKeys(keys, opts);
|
345
|
-
})();
|
346
|
-
}
|
347
|
-
importRoomKeysAsJson(keys, opts) {
|
348
|
-
var _this10 = this;
|
349
|
-
return _asyncToGenerator(function* () {
|
350
|
-
return yield _this10.backupManager.importRoomKeysAsJson(keys, opts);
|
351
|
-
})();
|
352
|
-
}
|
353
|
-
|
354
|
-
/**
|
355
|
-
* Implementation of {@link CryptoApi.userHasCrossSigningKeys}.
|
356
|
-
*/
|
357
|
-
userHasCrossSigningKeys() {
|
358
|
-
var _arguments = arguments,
|
359
|
-
_this11 = this;
|
360
|
-
return _asyncToGenerator(function* () {
|
361
|
-
var userId = _arguments.length > 0 && _arguments[0] !== undefined ? _arguments[0] : _this11.userId;
|
362
|
-
var downloadUncached = _arguments.length > 1 && _arguments[1] !== undefined ? _arguments[1] : false;
|
363
|
-
// TODO: could probably do with a more efficient way of doing this than returning the whole set and searching
|
364
|
-
var rustTrackedUsers = yield _this11.olmMachine.trackedUsers();
|
365
|
-
var rustTrackedUser;
|
366
|
-
for (var u of rustTrackedUsers) {
|
367
|
-
if (userId === u.toString()) {
|
368
|
-
rustTrackedUser = u;
|
369
|
-
break;
|
370
|
-
}
|
371
|
-
}
|
372
|
-
if (rustTrackedUser !== undefined) {
|
373
|
-
if (userId === _this11.userId) {
|
374
|
-
/* make sure we have an *up-to-date* idea of the user's cross-signing keys. This is important, because if we
|
375
|
-
* return "false" here, we will end up generating new cross-signing keys and replacing the existing ones.
|
376
|
-
*/
|
377
|
-
var request = _this11.olmMachine.queryKeysForUsers(
|
378
|
-
// clone as rust layer will take ownership and it's reused later
|
379
|
-
[rustTrackedUser.clone()]);
|
380
|
-
yield _this11.outgoingRequestProcessor.makeOutgoingRequest(request);
|
381
|
-
}
|
382
|
-
var userIdentity = yield _this11.olmMachine.getIdentity(rustTrackedUser);
|
383
|
-
userIdentity === null || userIdentity === void 0 || userIdentity.free();
|
384
|
-
return userIdentity !== undefined;
|
385
|
-
} else if (downloadUncached) {
|
386
|
-
var _keyResult$master_key;
|
387
|
-
// Download the cross signing keys and check if the master key is available
|
388
|
-
var keyResult = yield _this11.downloadDeviceList(new Set([userId]));
|
389
|
-
var keys = (_keyResult$master_key = keyResult.master_keys) === null || _keyResult$master_key === void 0 ? void 0 : _keyResult$master_key[userId];
|
390
|
-
|
391
|
-
// No master key
|
392
|
-
if (!keys) return false;
|
393
|
-
|
394
|
-
// `keys` is an object with { [`ed25519:${pubKey}`]: pubKey }
|
395
|
-
// We assume only a single key, and we want the bare form without type
|
396
|
-
// prefix, so we select the values.
|
397
|
-
return Boolean(Object.values(keys.keys)[0]);
|
398
|
-
} else {
|
399
|
-
return false;
|
400
|
-
}
|
401
|
-
})();
|
402
|
-
}
|
403
|
-
|
404
|
-
/**
|
405
|
-
* Get the device information for the given list of users.
|
406
|
-
*
|
407
|
-
* @param userIds - The users to fetch.
|
408
|
-
* @param downloadUncached - If true, download the device list for users whose device list we are not
|
409
|
-
* currently tracking. Defaults to false, in which case such users will not appear at all in the result map.
|
410
|
-
*
|
411
|
-
* @returns A map `{@link DeviceMap}`.
|
412
|
-
*/
|
413
|
-
getUserDeviceInfo(userIds) {
|
414
|
-
var _arguments2 = arguments,
|
415
|
-
_this12 = this;
|
416
|
-
return _asyncToGenerator(function* () {
|
417
|
-
var downloadUncached = _arguments2.length > 1 && _arguments2[1] !== undefined ? _arguments2[1] : false;
|
418
|
-
var deviceMapByUserId = new Map();
|
419
|
-
var rustTrackedUsers = yield _this12.getOlmMachineOrThrow().trackedUsers();
|
420
|
-
|
421
|
-
// Convert RustSdkCryptoJs.UserId to a `Set<string>`
|
422
|
-
var trackedUsers = new Set();
|
423
|
-
rustTrackedUsers.forEach(rustUserId => trackedUsers.add(rustUserId.toString()));
|
424
|
-
|
425
|
-
// Keep untracked user to download their keys after
|
426
|
-
var untrackedUsers = new Set();
|
427
|
-
for (var _userId of userIds) {
|
428
|
-
// if this is a tracked user, we can just fetch the device list from the rust-sdk
|
429
|
-
// (NB: this is probably ok even if we race with a leave event such that we stop tracking the user's
|
430
|
-
// devices: the rust-sdk will return the last-known device list, which will be good enough.)
|
431
|
-
if (trackedUsers.has(_userId)) {
|
432
|
-
deviceMapByUserId.set(_userId, yield _this12.getUserDevices(_userId));
|
433
|
-
} else {
|
434
|
-
untrackedUsers.add(_userId);
|
435
|
-
}
|
436
|
-
}
|
437
|
-
|
438
|
-
// for any users whose device lists we are not tracking, fall back to downloading the device list
|
439
|
-
// over HTTP.
|
440
|
-
if (downloadUncached && untrackedUsers.size >= 1) {
|
441
|
-
var queryResult = yield _this12.downloadDeviceList(untrackedUsers);
|
442
|
-
Object.entries(queryResult.device_keys).forEach(_ref => {
|
443
|
-
var [userId, deviceKeys] = _ref;
|
444
|
-
return deviceMapByUserId.set(userId, deviceKeysToDeviceMap(deviceKeys));
|
445
|
-
});
|
446
|
-
}
|
447
|
-
return deviceMapByUserId;
|
448
|
-
})();
|
449
|
-
}
|
450
|
-
|
451
|
-
/**
|
452
|
-
* Get the device list for the given user from the olm machine
|
453
|
-
* @param userId - Rust SDK UserId
|
454
|
-
*/
|
455
|
-
getUserDevices(userId) {
|
456
|
-
var _this13 = this;
|
457
|
-
return _asyncToGenerator(function* () {
|
458
|
-
var rustUserId = new RustSdkCryptoJs.UserId(userId);
|
459
|
-
|
460
|
-
// For reasons I don't really understand, the Javascript FinalizationRegistry doesn't seem to run the
|
461
|
-
// registered callbacks when `userDevices` goes out of scope, nor when the individual devices in the array
|
462
|
-
// returned by `userDevices.devices` do so.
|
463
|
-
//
|
464
|
-
// This is particularly problematic, because each of those structures holds a reference to the
|
465
|
-
// VerificationMachine, which in turn holds a reference to the IndexeddbCryptoStore. Hence, we end up leaking
|
466
|
-
// open connections to the crypto store, which means the store can't be deleted on logout.
|
467
|
-
//
|
468
|
-
// To fix this, we explicitly call `.free` on each of the objects, which tells the rust code to drop the
|
469
|
-
// allocated memory and decrement the refcounts for the crypto store.
|
470
|
-
|
471
|
-
// Wait for up to a second for any in-flight device list requests to complete.
|
472
|
-
// The reason for this isn't so much to avoid races (some level of raciness is
|
473
|
-
// inevitable for this method) but to make testing easier.
|
474
|
-
var userDevices = yield _this13.olmMachine.getUserDevices(rustUserId, 1);
|
475
|
-
try {
|
476
|
-
var deviceArray = userDevices.devices();
|
477
|
-
try {
|
478
|
-
return new Map(deviceArray.map(device => [device.deviceId.toString(), rustDeviceToJsDevice(device, rustUserId)]));
|
479
|
-
} finally {
|
480
|
-
deviceArray.forEach(d => d.free());
|
481
|
-
}
|
482
|
-
} finally {
|
483
|
-
userDevices.free();
|
484
|
-
}
|
485
|
-
})();
|
486
|
-
}
|
487
|
-
|
488
|
-
/**
|
489
|
-
* Download the given user keys by calling `/keys/query` request
|
490
|
-
* @param untrackedUsers - download keys of these users
|
491
|
-
*/
|
492
|
-
downloadDeviceList(untrackedUsers) {
|
493
|
-
var _this14 = this;
|
494
|
-
return _asyncToGenerator(function* () {
|
495
|
-
var queryBody = {
|
496
|
-
device_keys: {}
|
497
|
-
};
|
498
|
-
untrackedUsers.forEach(user => queryBody.device_keys[user] = []);
|
499
|
-
return yield _this14.http.authedRequest(Method.Post, "/_matrix/client/v3/keys/query", undefined, queryBody, {
|
500
|
-
prefix: ""
|
501
|
-
});
|
502
|
-
})();
|
503
|
-
}
|
504
|
-
|
505
|
-
/**
|
506
|
-
* Implementation of {@link CryptoApi#getTrustCrossSignedDevices}.
|
507
|
-
*/
|
508
|
-
getTrustCrossSignedDevices() {
|
509
|
-
return this._trustCrossSignedDevices;
|
510
|
-
}
|
511
|
-
|
512
|
-
/**
|
513
|
-
* Implementation of {@link CryptoApi#setTrustCrossSignedDevices}.
|
514
|
-
*/
|
515
|
-
setTrustCrossSignedDevices(val) {
|
516
|
-
this._trustCrossSignedDevices = val;
|
517
|
-
// TODO: legacy crypto goes through the list of known devices and emits DeviceVerificationChanged
|
518
|
-
// events. Maybe we need to do the same?
|
519
|
-
}
|
520
|
-
|
521
|
-
/**
|
522
|
-
* Mark the given device as locally verified.
|
523
|
-
*
|
524
|
-
* Implementation of {@link CryptoApi#setDeviceVerified}.
|
525
|
-
*/
|
526
|
-
setDeviceVerified(userId, deviceId) {
|
527
|
-
var _arguments3 = arguments,
|
528
|
-
_this15 = this;
|
529
|
-
return _asyncToGenerator(function* () {
|
530
|
-
var verified = _arguments3.length > 2 && _arguments3[2] !== undefined ? _arguments3[2] : true;
|
531
|
-
var device = yield _this15.olmMachine.getDevice(new RustSdkCryptoJs.UserId(userId), new RustSdkCryptoJs.DeviceId(deviceId));
|
532
|
-
if (!device) {
|
533
|
-
throw new Error("Unknown device ".concat(userId, "|").concat(deviceId));
|
534
|
-
}
|
535
|
-
try {
|
536
|
-
yield device.setLocalTrust(verified ? RustSdkCryptoJs.LocalTrust.Verified : RustSdkCryptoJs.LocalTrust.Unset);
|
537
|
-
} finally {
|
538
|
-
device.free();
|
539
|
-
}
|
540
|
-
})();
|
541
|
-
}
|
542
|
-
|
543
|
-
/**
|
544
|
-
* Blindly cross-sign one of our other devices.
|
545
|
-
*
|
546
|
-
* Implementation of {@link CryptoApi#crossSignDevice}.
|
547
|
-
*/
|
548
|
-
crossSignDevice(deviceId) {
|
549
|
-
var _this16 = this;
|
550
|
-
return _asyncToGenerator(function* () {
|
551
|
-
var device = yield _this16.olmMachine.getDevice(new RustSdkCryptoJs.UserId(_this16.userId), new RustSdkCryptoJs.DeviceId(deviceId));
|
552
|
-
if (!device) {
|
553
|
-
throw new Error("Unknown device ".concat(deviceId));
|
554
|
-
}
|
555
|
-
try {
|
556
|
-
var outgoingRequest = yield device.verify();
|
557
|
-
yield _this16.outgoingRequestProcessor.makeOutgoingRequest(outgoingRequest);
|
558
|
-
} finally {
|
559
|
-
device.free();
|
560
|
-
}
|
561
|
-
})();
|
562
|
-
}
|
563
|
-
|
564
|
-
/**
|
565
|
-
* Implementation of {@link CryptoApi#getDeviceVerificationStatus}.
|
566
|
-
*/
|
567
|
-
getDeviceVerificationStatus(userId, deviceId) {
|
568
|
-
var _this17 = this;
|
569
|
-
return _asyncToGenerator(function* () {
|
570
|
-
var device = yield _this17.olmMachine.getDevice(new RustSdkCryptoJs.UserId(userId), new RustSdkCryptoJs.DeviceId(deviceId));
|
571
|
-
if (!device) return null;
|
572
|
-
try {
|
573
|
-
return new DeviceVerificationStatus({
|
574
|
-
signedByOwner: device.isCrossSignedByOwner(),
|
575
|
-
crossSigningVerified: device.isCrossSigningTrusted(),
|
576
|
-
localVerified: device.isLocallyTrusted(),
|
577
|
-
trustCrossSignedDevices: _this17._trustCrossSignedDevices
|
578
|
-
});
|
579
|
-
} finally {
|
580
|
-
device.free();
|
581
|
-
}
|
582
|
-
})();
|
583
|
-
}
|
584
|
-
|
585
|
-
/**
|
586
|
-
* Implementation of {@link CryptoApi#getUserVerificationStatus}.
|
587
|
-
*/
|
588
|
-
getUserVerificationStatus(userId) {
|
589
|
-
var _this18 = this;
|
590
|
-
return _asyncToGenerator(function* () {
|
591
|
-
var userIdentity = yield _this18.getOlmMachineOrThrow().getIdentity(new RustSdkCryptoJs.UserId(userId));
|
592
|
-
if (userIdentity === undefined) {
|
593
|
-
return new UserVerificationStatus(false, false, false);
|
594
|
-
}
|
595
|
-
var verified = userIdentity.isVerified();
|
596
|
-
var wasVerified = userIdentity.wasPreviouslyVerified();
|
597
|
-
var needsUserApproval = userIdentity instanceof RustSdkCryptoJs.UserIdentity ? userIdentity.identityNeedsUserApproval() : false;
|
598
|
-
userIdentity.free();
|
599
|
-
return new UserVerificationStatus(verified, wasVerified, false, needsUserApproval);
|
600
|
-
})();
|
601
|
-
}
|
602
|
-
|
603
|
-
/**
|
604
|
-
* Implementation of {@link CryptoApi#pinCurrentUserIdentity}.
|
605
|
-
*/
|
606
|
-
pinCurrentUserIdentity(userId) {
|
607
|
-
var _this19 = this;
|
608
|
-
return _asyncToGenerator(function* () {
|
609
|
-
var userIdentity = yield _this19.getOlmMachineOrThrow().getIdentity(new RustSdkCryptoJs.UserId(userId));
|
610
|
-
if (userIdentity === undefined) {
|
611
|
-
throw new Error("Cannot pin identity of unknown user");
|
612
|
-
}
|
613
|
-
if (userIdentity instanceof RustSdkCryptoJs.OwnUserIdentity) {
|
614
|
-
throw new Error("Cannot pin identity of own user");
|
615
|
-
}
|
616
|
-
yield userIdentity.pinCurrentMasterKey();
|
617
|
-
})();
|
618
|
-
}
|
619
|
-
|
620
|
-
/**
|
621
|
-
* Implementation of {@link CryptoApi#isCrossSigningReady}
|
622
|
-
*/
|
623
|
-
isCrossSigningReady() {
|
624
|
-
var _this20 = this;
|
625
|
-
return _asyncToGenerator(function* () {
|
626
|
-
var {
|
627
|
-
privateKeysInSecretStorage,
|
628
|
-
privateKeysCachedLocally
|
629
|
-
} = yield _this20.getCrossSigningStatus();
|
630
|
-
var hasKeysInCache = Boolean(privateKeysCachedLocally.masterKey) && Boolean(privateKeysCachedLocally.selfSigningKey) && Boolean(privateKeysCachedLocally.userSigningKey);
|
631
|
-
var identity = yield _this20.getOwnIdentity();
|
632
|
-
|
633
|
-
// Cross-signing is ready if the public identity is trusted, and the private keys
|
634
|
-
// are either cached, or accessible via secret-storage.
|
635
|
-
return !!(identity !== null && identity !== void 0 && identity.isVerified()) && (hasKeysInCache || privateKeysInSecretStorage);
|
636
|
-
})();
|
637
|
-
}
|
638
|
-
|
639
|
-
/**
|
640
|
-
* Implementation of {@link CryptoApi#getCrossSigningKeyId}
|
641
|
-
*/
|
642
|
-
getCrossSigningKeyId() {
|
643
|
-
var _arguments4 = arguments,
|
644
|
-
_this21 = this;
|
645
|
-
return _asyncToGenerator(function* () {
|
646
|
-
var type = _arguments4.length > 0 && _arguments4[0] !== undefined ? _arguments4[0] : CrossSigningKey.Master;
|
647
|
-
var userIdentity = yield _this21.olmMachine.getIdentity(new RustSdkCryptoJs.UserId(_this21.userId));
|
648
|
-
if (!userIdentity) {
|
649
|
-
// The public keys are not available on this device
|
650
|
-
return null;
|
651
|
-
}
|
652
|
-
try {
|
653
|
-
var crossSigningStatus = yield _this21.olmMachine.crossSigningStatus();
|
654
|
-
var privateKeysOnDevice = crossSigningStatus.hasMaster && crossSigningStatus.hasUserSigning && crossSigningStatus.hasSelfSigning;
|
655
|
-
if (!privateKeysOnDevice) {
|
656
|
-
// The private keys are not available on this device
|
657
|
-
return null;
|
658
|
-
}
|
659
|
-
if (!userIdentity.isVerified()) {
|
660
|
-
// We have both public and private keys, but they don't match!
|
661
|
-
return null;
|
662
|
-
}
|
663
|
-
var key;
|
664
|
-
switch (type) {
|
665
|
-
case CrossSigningKey.Master:
|
666
|
-
key = userIdentity.masterKey;
|
667
|
-
break;
|
668
|
-
case CrossSigningKey.SelfSigning:
|
669
|
-
key = userIdentity.selfSigningKey;
|
670
|
-
break;
|
671
|
-
case CrossSigningKey.UserSigning:
|
672
|
-
key = userIdentity.userSigningKey;
|
673
|
-
break;
|
674
|
-
default:
|
675
|
-
// Unknown type
|
676
|
-
return null;
|
677
|
-
}
|
678
|
-
var parsedKey = JSON.parse(key);
|
679
|
-
// `keys` is an object with { [`ed25519:${pubKey}`]: pubKey }
|
680
|
-
// We assume only a single key, and we want the bare form without type
|
681
|
-
// prefix, so we select the values.
|
682
|
-
return Object.values(parsedKey.keys)[0];
|
683
|
-
} finally {
|
684
|
-
userIdentity.free();
|
685
|
-
}
|
686
|
-
})();
|
687
|
-
}
|
688
|
-
|
689
|
-
/**
|
690
|
-
* Implementation of {@link CryptoApi#bootstrapCrossSigning}
|
691
|
-
*/
|
692
|
-
bootstrapCrossSigning(opts) {
|
693
|
-
var _this22 = this;
|
694
|
-
return _asyncToGenerator(function* () {
|
695
|
-
yield _this22.crossSigningIdentity.bootstrapCrossSigning(opts);
|
696
|
-
})();
|
697
|
-
}
|
698
|
-
|
699
|
-
/**
|
700
|
-
* Implementation of {@link CryptoApi#isSecretStorageReady}
|
701
|
-
*/
|
702
|
-
isSecretStorageReady() {
|
703
|
-
var _this23 = this;
|
704
|
-
return _asyncToGenerator(function* () {
|
705
|
-
// make sure that the cross-signing keys are stored
|
706
|
-
var secretsToCheck = ["m.cross_signing.master", "m.cross_signing.user_signing", "m.cross_signing.self_signing"];
|
707
|
-
|
708
|
-
// if key backup is active, we also need to check that the backup decryption key is stored
|
709
|
-
var keyBackupEnabled = (yield _this23.backupManager.getActiveBackupVersion()) != null;
|
710
|
-
if (keyBackupEnabled) {
|
711
|
-
secretsToCheck.push("m.megolm_backup.v1");
|
712
|
-
}
|
713
|
-
return secretStorageCanAccessSecrets(_this23.secretStorage, secretsToCheck);
|
714
|
-
})();
|
715
|
-
}
|
716
|
-
|
717
|
-
/**
|
718
|
-
* Implementation of {@link CryptoApi#bootstrapSecretStorage}
|
719
|
-
*/
|
720
|
-
bootstrapSecretStorage() {
|
721
|
-
var _arguments5 = arguments,
|
722
|
-
_this24 = this;
|
723
|
-
return _asyncToGenerator(function* () {
|
724
|
-
var {
|
725
|
-
createSecretStorageKey,
|
726
|
-
setupNewSecretStorage,
|
727
|
-
setupNewKeyBackup
|
728
|
-
} = _arguments5.length > 0 && _arguments5[0] !== undefined ? _arguments5[0] : {};
|
729
|
-
// If an AES Key is already stored in the secret storage and setupNewSecretStorage is not set
|
730
|
-
// we don't want to create a new key
|
731
|
-
var isNewSecretStorageKeyNeeded = setupNewSecretStorage || !(yield _this24.secretStorageHasAESKey());
|
732
|
-
if (isNewSecretStorageKeyNeeded) {
|
733
|
-
if (!createSecretStorageKey) {
|
734
|
-
throw new Error("unable to create a new secret storage key, createSecretStorageKey is not set");
|
735
|
-
}
|
736
|
-
|
737
|
-
// Create a new storage key and add it to secret storage
|
738
|
-
_this24.logger.info("bootstrapSecretStorage: creating new secret storage key");
|
739
|
-
var recoveryKey = yield createSecretStorageKey();
|
740
|
-
if (!recoveryKey) {
|
741
|
-
throw new Error("createSecretStorageKey() callback did not return a secret storage key");
|
742
|
-
}
|
743
|
-
yield _this24.addSecretStorageKeyToSecretStorage(recoveryKey);
|
744
|
-
}
|
745
|
-
var crossSigningStatus = yield _this24.olmMachine.crossSigningStatus();
|
746
|
-
var hasPrivateKeys = crossSigningStatus.hasMaster && crossSigningStatus.hasSelfSigning && crossSigningStatus.hasUserSigning;
|
747
|
-
|
748
|
-
// If we have cross-signing private keys cached, store them in secret
|
749
|
-
// storage if they are not there already.
|
750
|
-
if (hasPrivateKeys && (isNewSecretStorageKeyNeeded || !(yield secretStorageContainsCrossSigningKeys(_this24.secretStorage)))) {
|
751
|
-
_this24.logger.info("bootstrapSecretStorage: cross-signing keys not yet exported; doing so now.");
|
752
|
-
var crossSigningPrivateKeys = yield _this24.olmMachine.exportCrossSigningKeys();
|
753
|
-
if (!crossSigningPrivateKeys.masterKey) {
|
754
|
-
throw new Error("missing master key in cross signing private keys");
|
755
|
-
}
|
756
|
-
if (!crossSigningPrivateKeys.userSigningKey) {
|
757
|
-
throw new Error("missing user signing key in cross signing private keys");
|
758
|
-
}
|
759
|
-
if (!crossSigningPrivateKeys.self_signing_key) {
|
760
|
-
throw new Error("missing self signing key in cross signing private keys");
|
761
|
-
}
|
762
|
-
yield _this24.secretStorage.store("m.cross_signing.master", crossSigningPrivateKeys.masterKey);
|
763
|
-
yield _this24.secretStorage.store("m.cross_signing.user_signing", crossSigningPrivateKeys.userSigningKey);
|
764
|
-
yield _this24.secretStorage.store("m.cross_signing.self_signing", crossSigningPrivateKeys.self_signing_key);
|
765
|
-
}
|
766
|
-
if (setupNewKeyBackup) {
|
767
|
-
yield _this24.resetKeyBackup();
|
768
|
-
}
|
769
|
-
})();
|
770
|
-
}
|
771
|
-
|
772
|
-
/**
|
773
|
-
* Add the secretStorage key to the secret storage
|
774
|
-
* - The secret storage key must have the `keyInfo` field filled
|
775
|
-
* - The secret storage key is set as the default key of the secret storage
|
776
|
-
* - Call `cryptoCallbacks.cacheSecretStorageKey` when done
|
777
|
-
*
|
778
|
-
* @param secretStorageKey - The secret storage key to add in the secret storage.
|
779
|
-
*/
|
780
|
-
addSecretStorageKeyToSecretStorage(secretStorageKey) {
|
781
|
-
var _this25 = this;
|
782
|
-
return _asyncToGenerator(function* () {
|
783
|
-
var _secretStorageKey$key, _secretStorageKey$key2, _this25$cryptoCallbac, _this25$cryptoCallbac2;
|
784
|
-
var secretStorageKeyObject = yield _this25.secretStorage.addKey(SECRET_STORAGE_ALGORITHM_V1_AES, {
|
785
|
-
passphrase: (_secretStorageKey$key = secretStorageKey.keyInfo) === null || _secretStorageKey$key === void 0 ? void 0 : _secretStorageKey$key.passphrase,
|
786
|
-
name: (_secretStorageKey$key2 = secretStorageKey.keyInfo) === null || _secretStorageKey$key2 === void 0 ? void 0 : _secretStorageKey$key2.name,
|
787
|
-
key: secretStorageKey.privateKey
|
788
|
-
});
|
789
|
-
yield _this25.secretStorage.setDefaultKeyId(secretStorageKeyObject.keyId);
|
790
|
-
(_this25$cryptoCallbac = (_this25$cryptoCallbac2 = _this25.cryptoCallbacks).cacheSecretStorageKey) === null || _this25$cryptoCallbac === void 0 || _this25$cryptoCallbac.call(_this25$cryptoCallbac2, secretStorageKeyObject.keyId, secretStorageKeyObject.keyInfo, secretStorageKey.privateKey);
|
791
|
-
})();
|
792
|
-
}
|
793
|
-
|
794
|
-
/**
|
795
|
-
* Check if a secret storage AES Key is already added in secret storage
|
796
|
-
*
|
797
|
-
* @returns True if an AES key is in the secret storage
|
798
|
-
*/
|
799
|
-
secretStorageHasAESKey() {
|
800
|
-
var _this26 = this;
|
801
|
-
return _asyncToGenerator(function* () {
|
802
|
-
// See if we already have an AES secret-storage key.
|
803
|
-
var secretStorageKeyTuple = yield _this26.secretStorage.getKey();
|
804
|
-
if (!secretStorageKeyTuple) return false;
|
805
|
-
var [, keyInfo] = secretStorageKeyTuple;
|
806
|
-
|
807
|
-
// Check if the key is an AES key
|
808
|
-
return keyInfo.algorithm === SECRET_STORAGE_ALGORITHM_V1_AES;
|
809
|
-
})();
|
810
|
-
}
|
811
|
-
|
812
|
-
/**
|
813
|
-
* Implementation of {@link CryptoApi#getCrossSigningStatus}
|
814
|
-
*/
|
815
|
-
getCrossSigningStatus() {
|
816
|
-
var _this27 = this;
|
817
|
-
return _asyncToGenerator(function* () {
|
818
|
-
var userIdentity = yield _this27.getOlmMachineOrThrow().getIdentity(new RustSdkCryptoJs.UserId(_this27.userId));
|
819
|
-
var publicKeysOnDevice = Boolean(userIdentity === null || userIdentity === void 0 ? void 0 : userIdentity.masterKey) && Boolean(userIdentity === null || userIdentity === void 0 ? void 0 : userIdentity.selfSigningKey) && Boolean(userIdentity === null || userIdentity === void 0 ? void 0 : userIdentity.userSigningKey);
|
820
|
-
userIdentity === null || userIdentity === void 0 || userIdentity.free();
|
821
|
-
var privateKeysInSecretStorage = yield secretStorageContainsCrossSigningKeys(_this27.secretStorage);
|
822
|
-
var crossSigningStatus = yield _this27.getOlmMachineOrThrow().crossSigningStatus();
|
823
|
-
return {
|
824
|
-
publicKeysOnDevice,
|
825
|
-
privateKeysInSecretStorage,
|
826
|
-
privateKeysCachedLocally: {
|
827
|
-
masterKey: Boolean(crossSigningStatus === null || crossSigningStatus === void 0 ? void 0 : crossSigningStatus.hasMaster),
|
828
|
-
userSigningKey: Boolean(crossSigningStatus === null || crossSigningStatus === void 0 ? void 0 : crossSigningStatus.hasUserSigning),
|
829
|
-
selfSigningKey: Boolean(crossSigningStatus === null || crossSigningStatus === void 0 ? void 0 : crossSigningStatus.hasSelfSigning)
|
830
|
-
}
|
831
|
-
};
|
832
|
-
})();
|
833
|
-
}
|
834
|
-
|
835
|
-
/**
|
836
|
-
* Implementation of {@link CryptoApi#createRecoveryKeyFromPassphrase}
|
837
|
-
*/
|
838
|
-
createRecoveryKeyFromPassphrase(password) {
|
839
|
-
var _this28 = this;
|
840
|
-
return _asyncToGenerator(function* () {
|
841
|
-
if (password) {
|
842
|
-
// Generate the key from the passphrase
|
843
|
-
// first we generate a random salt
|
844
|
-
var salt = randomString(32);
|
845
|
-
// then we derive the key from the passphrase
|
846
|
-
var recoveryKey = yield deriveRecoveryKeyFromPassphrase(password, salt, _this28.RECOVERY_KEY_DERIVATION_ITERATIONS);
|
847
|
-
return {
|
848
|
-
keyInfo: {
|
849
|
-
passphrase: {
|
850
|
-
algorithm: "m.pbkdf2",
|
851
|
-
iterations: _this28.RECOVERY_KEY_DERIVATION_ITERATIONS,
|
852
|
-
salt
|
853
|
-
}
|
854
|
-
},
|
855
|
-
privateKey: recoveryKey,
|
856
|
-
encodedPrivateKey: encodeRecoveryKey(recoveryKey)
|
857
|
-
};
|
858
|
-
} else {
|
859
|
-
// Using the navigator crypto API to generate the private key
|
860
|
-
var key = new Uint8Array(32);
|
861
|
-
globalThis.crypto.getRandomValues(key);
|
862
|
-
return {
|
863
|
-
privateKey: key,
|
864
|
-
encodedPrivateKey: encodeRecoveryKey(key)
|
865
|
-
};
|
866
|
-
}
|
867
|
-
})();
|
868
|
-
}
|
869
|
-
|
870
|
-
/**
|
871
|
-
* Implementation of {@link CryptoApi#getEncryptionInfoForEvent}.
|
872
|
-
*/
|
873
|
-
getEncryptionInfoForEvent(event) {
|
874
|
-
var _this29 = this;
|
875
|
-
return _asyncToGenerator(function* () {
|
876
|
-
return _this29.eventDecryptor.getEncryptionInfoForEvent(event);
|
877
|
-
})();
|
878
|
-
}
|
879
|
-
|
880
|
-
/**
|
881
|
-
* Returns to-device verification requests that are already in progress for the given user id.
|
882
|
-
*
|
883
|
-
* Implementation of {@link CryptoApi#getVerificationRequestsToDeviceInProgress}
|
884
|
-
*
|
885
|
-
* @param userId - the ID of the user to query
|
886
|
-
*
|
887
|
-
* @returns the VerificationRequests that are in progress
|
888
|
-
*/
|
889
|
-
getVerificationRequestsToDeviceInProgress(userId) {
|
890
|
-
var requests = this.olmMachine.getVerificationRequests(new RustSdkCryptoJs.UserId(userId));
|
891
|
-
return requests.filter(request => request.roomId === undefined).map(request => new RustVerificationRequest(this.olmMachine, request, this.outgoingRequestProcessor, this._supportedVerificationMethods));
|
892
|
-
}
|
893
|
-
|
894
|
-
/**
|
895
|
-
* Finds a DM verification request that is already in progress for the given room id
|
896
|
-
*
|
897
|
-
* Implementation of {@link CryptoApi#findVerificationRequestDMInProgress}
|
898
|
-
*
|
899
|
-
* @param roomId - the room to use for verification
|
900
|
-
* @param userId - search the verification request for the given user
|
901
|
-
*
|
902
|
-
* @returns the VerificationRequest that is in progress, if any
|
903
|
-
*
|
904
|
-
*/
|
905
|
-
findVerificationRequestDMInProgress(roomId, userId) {
|
906
|
-
if (!userId) throw new Error("missing userId");
|
907
|
-
var requests = this.olmMachine.getVerificationRequests(new RustSdkCryptoJs.UserId(userId));
|
908
|
-
|
909
|
-
// Search for the verification request for the given room id
|
910
|
-
var request = requests.find(request => {
|
911
|
-
var _request$roomId;
|
912
|
-
return ((_request$roomId = request.roomId) === null || _request$roomId === void 0 ? void 0 : _request$roomId.toString()) === roomId;
|
913
|
-
});
|
914
|
-
if (request) {
|
915
|
-
return new RustVerificationRequest(this.olmMachine, request, this.outgoingRequestProcessor, this._supportedVerificationMethods);
|
916
|
-
}
|
917
|
-
}
|
918
|
-
|
919
|
-
/**
|
920
|
-
* Implementation of {@link CryptoApi#requestVerificationDM}
|
921
|
-
*/
|
922
|
-
requestVerificationDM(userId, roomId) {
|
923
|
-
var _this30 = this;
|
924
|
-
return _asyncToGenerator(function* () {
|
925
|
-
var userIdentity = yield _this30.olmMachine.getIdentity(new RustSdkCryptoJs.UserId(userId));
|
926
|
-
if (!userIdentity) throw new Error("unknown userId ".concat(userId));
|
927
|
-
try {
|
928
|
-
// Transform the verification methods into rust objects
|
929
|
-
var methods = _this30._supportedVerificationMethods.map(method => verificationMethodIdentifierToMethod(method));
|
930
|
-
// Get the request content to send to the DM room
|
931
|
-
var verificationEventContent = yield userIdentity.verificationRequestContent(methods);
|
932
|
-
|
933
|
-
// Send the request content to send to the DM room
|
934
|
-
var eventId = yield _this30.sendVerificationRequestContent(roomId, verificationEventContent);
|
935
|
-
|
936
|
-
// Get a verification request
|
937
|
-
var request = yield userIdentity.requestVerification(new RustSdkCryptoJs.RoomId(roomId), new RustSdkCryptoJs.EventId(eventId), methods);
|
938
|
-
return new RustVerificationRequest(_this30.olmMachine, request, _this30.outgoingRequestProcessor, _this30._supportedVerificationMethods);
|
939
|
-
} finally {
|
940
|
-
userIdentity.free();
|
941
|
-
}
|
942
|
-
})();
|
943
|
-
}
|
944
|
-
|
945
|
-
/**
|
946
|
-
* Send the verification content to a room
|
947
|
-
* See https://spec.matrix.org/v1.7/client-server-api/#put_matrixclientv3roomsroomidsendeventtypetxnid
|
948
|
-
*
|
949
|
-
* Prefer to use {@link OutgoingRequestProcessor.makeOutgoingRequest} when dealing with {@link RustSdkCryptoJs.RoomMessageRequest}
|
950
|
-
*
|
951
|
-
* @param roomId - the targeted room
|
952
|
-
* @param verificationEventContent - the request body.
|
953
|
-
*
|
954
|
-
* @returns the event id
|
955
|
-
*/
|
956
|
-
sendVerificationRequestContent(roomId, verificationEventContent) {
|
957
|
-
var _this31 = this;
|
958
|
-
return _asyncToGenerator(function* () {
|
959
|
-
var txId = randomString(32);
|
960
|
-
// Send the verification request content to the DM room
|
961
|
-
var {
|
962
|
-
event_id: eventId
|
963
|
-
} = yield _this31.http.authedRequest(Method.Put, "/_matrix/client/v3/rooms/".concat(encodeURIComponent(roomId), "/send/m.room.message/").concat(encodeURIComponent(txId)), undefined, verificationEventContent, {
|
964
|
-
prefix: ""
|
965
|
-
});
|
966
|
-
return eventId;
|
967
|
-
})();
|
968
|
-
}
|
969
|
-
/**
|
970
|
-
* Set the verification methods we offer to the other side during an interactive verification.
|
971
|
-
*
|
972
|
-
* If `undefined`, we will offer all the methods supported by the Rust SDK.
|
973
|
-
*/
|
974
|
-
setSupportedVerificationMethods(methods) {
|
975
|
-
// by default, the Rust SDK does not offer `m.qr_code.scan.v1`, but we do want to offer that.
|
976
|
-
this._supportedVerificationMethods = methods !== null && methods !== void 0 ? methods : ALL_VERIFICATION_METHODS;
|
977
|
-
}
|
978
|
-
|
979
|
-
/**
|
980
|
-
* Send a verification request to our other devices.
|
981
|
-
*
|
982
|
-
* If a verification is already in flight, returns it. Otherwise, initiates a new one.
|
983
|
-
*
|
984
|
-
* Implementation of {@link CryptoApi#requestOwnUserVerification}.
|
985
|
-
*
|
986
|
-
* @returns a VerificationRequest when the request has been sent to the other party.
|
987
|
-
*/
|
988
|
-
requestOwnUserVerification() {
|
989
|
-
var _this32 = this;
|
990
|
-
return _asyncToGenerator(function* () {
|
991
|
-
var userIdentity = yield _this32.olmMachine.getIdentity(new RustSdkCryptoJs.UserId(_this32.userId));
|
992
|
-
if (userIdentity === undefined) {
|
993
|
-
throw new Error("cannot request verification for this device when there is no existing cross-signing key");
|
994
|
-
}
|
995
|
-
try {
|
996
|
-
var [request, outgoingRequest] = yield userIdentity.requestVerification(_this32._supportedVerificationMethods.map(verificationMethodIdentifierToMethod));
|
997
|
-
yield _this32.outgoingRequestProcessor.makeOutgoingRequest(outgoingRequest);
|
998
|
-
return new RustVerificationRequest(_this32.olmMachine, request, _this32.outgoingRequestProcessor, _this32._supportedVerificationMethods);
|
999
|
-
} finally {
|
1000
|
-
userIdentity.free();
|
1001
|
-
}
|
1002
|
-
})();
|
1003
|
-
}
|
1004
|
-
|
1005
|
-
/**
|
1006
|
-
* Request an interactive verification with the given device.
|
1007
|
-
*
|
1008
|
-
* If a verification is already in flight, returns it. Otherwise, initiates a new one.
|
1009
|
-
*
|
1010
|
-
* Implementation of {@link CryptoApi#requestDeviceVerification}.
|
1011
|
-
*
|
1012
|
-
* @param userId - ID of the owner of the device to verify
|
1013
|
-
* @param deviceId - ID of the device to verify
|
1014
|
-
*
|
1015
|
-
* @returns a VerificationRequest when the request has been sent to the other party.
|
1016
|
-
*/
|
1017
|
-
requestDeviceVerification(userId, deviceId) {
|
1018
|
-
var _this33 = this;
|
1019
|
-
return _asyncToGenerator(function* () {
|
1020
|
-
var device = yield _this33.olmMachine.getDevice(new RustSdkCryptoJs.UserId(userId), new RustSdkCryptoJs.DeviceId(deviceId));
|
1021
|
-
if (!device) {
|
1022
|
-
throw new Error("Not a known device");
|
1023
|
-
}
|
1024
|
-
try {
|
1025
|
-
var [request, outgoingRequest] = device.requestVerification(_this33._supportedVerificationMethods.map(verificationMethodIdentifierToMethod));
|
1026
|
-
yield _this33.outgoingRequestProcessor.makeOutgoingRequest(outgoingRequest);
|
1027
|
-
return new RustVerificationRequest(_this33.olmMachine, request, _this33.outgoingRequestProcessor, _this33._supportedVerificationMethods);
|
1028
|
-
} finally {
|
1029
|
-
device.free();
|
1030
|
-
}
|
1031
|
-
})();
|
1032
|
-
}
|
1033
|
-
|
1034
|
-
/**
|
1035
|
-
* Fetch the backup decryption key we have saved in our store.
|
1036
|
-
*
|
1037
|
-
* Implementation of {@link CryptoApi#getSessionBackupPrivateKey}.
|
1038
|
-
*
|
1039
|
-
* @returns the key, if any, or null
|
1040
|
-
*/
|
1041
|
-
getSessionBackupPrivateKey() {
|
1042
|
-
var _this34 = this;
|
1043
|
-
return _asyncToGenerator(function* () {
|
1044
|
-
var backupKeys = yield _this34.olmMachine.getBackupKeys();
|
1045
|
-
if (!backupKeys.decryptionKey) return null;
|
1046
|
-
return Buffer.from(backupKeys.decryptionKey.toBase64(), "base64");
|
1047
|
-
})();
|
1048
|
-
}
|
1049
|
-
|
1050
|
-
/**
|
1051
|
-
* Store the backup decryption key.
|
1052
|
-
*
|
1053
|
-
* Implementation of {@link CryptoApi#storeSessionBackupPrivateKey}.
|
1054
|
-
*
|
1055
|
-
* @param key - the backup decryption key
|
1056
|
-
* @param version - the backup version for this key.
|
1057
|
-
*/
|
1058
|
-
storeSessionBackupPrivateKey(key, version) {
|
1059
|
-
var _this35 = this;
|
1060
|
-
return _asyncToGenerator(function* () {
|
1061
|
-
var base64Key = encodeBase64(key);
|
1062
|
-
if (!version) {
|
1063
|
-
throw new Error("storeSessionBackupPrivateKey: version is required");
|
1064
|
-
}
|
1065
|
-
yield _this35.backupManager.saveBackupDecryptionKey(RustSdkCryptoJs.BackupDecryptionKey.fromBase64(base64Key), version);
|
1066
|
-
})();
|
1067
|
-
}
|
1068
|
-
|
1069
|
-
/**
|
1070
|
-
* Implementation of {@link CryptoApi#loadSessionBackupPrivateKeyFromSecretStorage}.
|
1071
|
-
*/
|
1072
|
-
loadSessionBackupPrivateKeyFromSecretStorage() {
|
1073
|
-
var _this36 = this;
|
1074
|
-
return _asyncToGenerator(function* () {
|
1075
|
-
var backupKey = yield _this36.secretStorage.get("m.megolm_backup.v1");
|
1076
|
-
if (!backupKey) {
|
1077
|
-
throw new Error("loadSessionBackupPrivateKeyFromSecretStorage: missing decryption key in secret storage");
|
1078
|
-
}
|
1079
|
-
var keyBackupInfo = yield _this36.backupManager.getServerBackupInfo();
|
1080
|
-
if (!keyBackupInfo || !keyBackupInfo.version) {
|
1081
|
-
throw new Error("loadSessionBackupPrivateKeyFromSecretStorage: unable to get backup version");
|
1082
|
-
}
|
1083
|
-
var backupDecryptionKey = RustSdkCryptoJs.BackupDecryptionKey.fromBase64(backupKey);
|
1084
|
-
if (!decryptionKeyMatchesKeyBackupInfo(backupDecryptionKey, keyBackupInfo)) {
|
1085
|
-
throw new Error("loadSessionBackupPrivateKeyFromSecretStorage: decryption key does not match backup info");
|
1086
|
-
}
|
1087
|
-
yield _this36.backupManager.saveBackupDecryptionKey(backupDecryptionKey, keyBackupInfo.version);
|
1088
|
-
})();
|
1089
|
-
}
|
1090
|
-
|
1091
|
-
/**
|
1092
|
-
* Get the current status of key backup.
|
1093
|
-
*
|
1094
|
-
* Implementation of {@link CryptoApi#getActiveSessionBackupVersion}.
|
1095
|
-
*/
|
1096
|
-
getActiveSessionBackupVersion() {
|
1097
|
-
var _this37 = this;
|
1098
|
-
return _asyncToGenerator(function* () {
|
1099
|
-
return yield _this37.backupManager.getActiveBackupVersion();
|
1100
|
-
})();
|
1101
|
-
}
|
1102
|
-
|
1103
|
-
/**
|
1104
|
-
* Implementation of {@link CryptoApi#getKeyBackupInfo}.
|
1105
|
-
*/
|
1106
|
-
getKeyBackupInfo() {
|
1107
|
-
var _this38 = this;
|
1108
|
-
return _asyncToGenerator(function* () {
|
1109
|
-
return (yield _this38.backupManager.getServerBackupInfo()) || null;
|
1110
|
-
})();
|
1111
|
-
}
|
1112
|
-
|
1113
|
-
/**
|
1114
|
-
* Determine if a key backup can be trusted.
|
1115
|
-
*
|
1116
|
-
* Implementation of {@link CryptoApi#isKeyBackupTrusted}.
|
1117
|
-
*/
|
1118
|
-
isKeyBackupTrusted(info) {
|
1119
|
-
var _this39 = this;
|
1120
|
-
return _asyncToGenerator(function* () {
|
1121
|
-
return yield _this39.backupManager.isKeyBackupTrusted(info);
|
1122
|
-
})();
|
1123
|
-
}
|
1124
|
-
|
1125
|
-
/**
|
1126
|
-
* Force a re-check of the key backup and enable/disable it as appropriate.
|
1127
|
-
*
|
1128
|
-
* Implementation of {@link CryptoApi#checkKeyBackupAndEnable}.
|
1129
|
-
*/
|
1130
|
-
checkKeyBackupAndEnable() {
|
1131
|
-
var _this40 = this;
|
1132
|
-
return _asyncToGenerator(function* () {
|
1133
|
-
return yield _this40.backupManager.checkKeyBackupAndEnable(true);
|
1134
|
-
})();
|
1135
|
-
}
|
1136
|
-
|
1137
|
-
/**
|
1138
|
-
* Implementation of {@link CryptoApi#deleteKeyBackupVersion}.
|
1139
|
-
*/
|
1140
|
-
deleteKeyBackupVersion(version) {
|
1141
|
-
var _this41 = this;
|
1142
|
-
return _asyncToGenerator(function* () {
|
1143
|
-
yield _this41.backupManager.deleteKeyBackupVersion(version);
|
1144
|
-
})();
|
1145
|
-
}
|
1146
|
-
|
1147
|
-
/**
|
1148
|
-
* Implementation of {@link CryptoApi#resetKeyBackup}.
|
1149
|
-
*/
|
1150
|
-
resetKeyBackup() {
|
1151
|
-
var _this42 = this;
|
1152
|
-
return _asyncToGenerator(function* () {
|
1153
|
-
var backupInfo = yield _this42.backupManager.setupKeyBackup(o => _this42.signObject(o));
|
1154
|
-
|
1155
|
-
// we want to store the private key in 4S
|
1156
|
-
// need to check if 4S is set up?
|
1157
|
-
if (yield _this42.secretStorageHasAESKey()) {
|
1158
|
-
yield _this42.secretStorage.store("m.megolm_backup.v1", backupInfo.decryptionKey.toBase64());
|
1159
|
-
}
|
1160
|
-
|
1161
|
-
// we can check and start async
|
1162
|
-
_this42.checkKeyBackupAndEnable();
|
1163
|
-
})();
|
1164
|
-
}
|
1165
|
-
|
1166
|
-
/**
|
1167
|
-
* Signs the given object with the current device and current identity (if available).
|
1168
|
-
* As defined in {@link https://spec.matrix.org/v1.8/appendices/#signing-json | Signing JSON}.
|
1169
|
-
*
|
1170
|
-
* Helper for {@link RustCrypto#resetKeyBackup}.
|
1171
|
-
*
|
1172
|
-
* @param obj - The object to sign
|
1173
|
-
*/
|
1174
|
-
signObject(obj) {
|
1175
|
-
var _this43 = this;
|
1176
|
-
return _asyncToGenerator(function* () {
|
1177
|
-
var sigs = new Map(Object.entries(obj.signatures || {}));
|
1178
|
-
var unsigned = obj.unsigned;
|
1179
|
-
delete obj.signatures;
|
1180
|
-
delete obj.unsigned;
|
1181
|
-
var userSignatures = sigs.get(_this43.userId) || {};
|
1182
|
-
var canonalizedJson = anotherjson.stringify(obj);
|
1183
|
-
var signatures = yield _this43.olmMachine.sign(canonalizedJson);
|
1184
|
-
var map = JSON.parse(signatures.asJSON());
|
1185
|
-
sigs.set(_this43.userId, _objectSpread(_objectSpread({}, userSignatures), map[_this43.userId]));
|
1186
|
-
if (unsigned !== undefined) obj.unsigned = unsigned;
|
1187
|
-
obj.signatures = Object.fromEntries(sigs.entries());
|
1188
|
-
})();
|
1189
|
-
}
|
1190
|
-
|
1191
|
-
/**
|
1192
|
-
* Implementation of {@link CryptoApi#restoreKeyBackupWithPassphrase}.
|
1193
|
-
*/
|
1194
|
-
restoreKeyBackupWithPassphrase(passphrase, opts) {
|
1195
|
-
var _this44 = this;
|
1196
|
-
return _asyncToGenerator(function* () {
|
1197
|
-
var backupInfo = yield _this44.backupManager.getServerBackupInfo();
|
1198
|
-
if (!(backupInfo !== null && backupInfo !== void 0 && backupInfo.version)) {
|
1199
|
-
throw new Error("No backup info available");
|
1200
|
-
}
|
1201
|
-
var privateKey = yield keyFromAuthData(backupInfo.auth_data, passphrase);
|
1202
|
-
|
1203
|
-
// Cache the key
|
1204
|
-
yield _this44.storeSessionBackupPrivateKey(privateKey, backupInfo.version);
|
1205
|
-
return _this44.restoreKeyBackup(opts);
|
1206
|
-
})();
|
1207
|
-
}
|
1208
|
-
|
1209
|
-
/**
|
1210
|
-
* Implementation of {@link CryptoApi#restoreKeyBackup}.
|
1211
|
-
*/
|
1212
|
-
restoreKeyBackup(opts) {
|
1213
|
-
var _this45 = this;
|
1214
|
-
return _asyncToGenerator(function* () {
|
1215
|
-
// Get the decryption key from the crypto store
|
1216
|
-
var backupKeys = yield _this45.olmMachine.getBackupKeys();
|
1217
|
-
var {
|
1218
|
-
decryptionKey,
|
1219
|
-
backupVersion
|
1220
|
-
} = backupKeys;
|
1221
|
-
if (!decryptionKey || !backupVersion) throw new Error("No decryption key found in crypto store");
|
1222
|
-
var decodedDecryptionKey = decodeBase64(decryptionKey.toBase64());
|
1223
|
-
var backupInfo = yield _this45.backupManager.requestKeyBackupVersion(backupVersion);
|
1224
|
-
if (!backupInfo) throw new Error("Backup version to restore ".concat(backupVersion, " not found on server"));
|
1225
|
-
var backupDecryptor = yield _this45.getBackupDecryptor(backupInfo, decodedDecryptionKey);
|
1226
|
-
try {
|
1227
|
-
var _opts$progressCallbac;
|
1228
|
-
opts === null || opts === void 0 || (_opts$progressCallbac = opts.progressCallback) === null || _opts$progressCallbac === void 0 || _opts$progressCallbac.call(opts, {
|
1229
|
-
stage: "fetch"
|
1230
|
-
});
|
1231
|
-
return yield _this45.backupManager.restoreKeyBackup(backupVersion, backupDecryptor, opts);
|
1232
|
-
} finally {
|
1233
|
-
// Free to avoid to keep in memory the decryption key stored in it. To avoid to exposing it to an attacker.
|
1234
|
-
backupDecryptor.free();
|
1235
|
-
}
|
1236
|
-
})();
|
1237
|
-
}
|
1238
|
-
|
1239
|
-
/**
|
1240
|
-
* Implementation of {@link CryptoApi#isDehydrationSupported}.
|
1241
|
-
*/
|
1242
|
-
isDehydrationSupported() {
|
1243
|
-
var _this46 = this;
|
1244
|
-
return _asyncToGenerator(function* () {
|
1245
|
-
return yield _this46.dehydratedDeviceManager.isSupported();
|
1246
|
-
})();
|
1247
|
-
}
|
1248
|
-
|
1249
|
-
/**
|
1250
|
-
* Implementation of {@link CryptoApi#startDehydration}.
|
1251
|
-
*/
|
1252
|
-
startDehydration(createNewKey) {
|
1253
|
-
var _this47 = this;
|
1254
|
-
return _asyncToGenerator(function* () {
|
1255
|
-
if (!(yield _this47.isCrossSigningReady()) || !(yield _this47.isSecretStorageReady())) {
|
1256
|
-
throw new Error("Device dehydration requires cross-signing and secret storage to be set up");
|
1257
|
-
}
|
1258
|
-
return yield _this47.dehydratedDeviceManager.start(createNewKey);
|
1259
|
-
})();
|
1260
|
-
}
|
1261
|
-
|
1262
|
-
/**
|
1263
|
-
* Implementation of {@link CryptoApi#importSecretsBundle}.
|
1264
|
-
*/
|
1265
|
-
importSecretsBundle(secrets) {
|
1266
|
-
var _this48 = this;
|
1267
|
-
return _asyncToGenerator(function* () {
|
1268
|
-
var secretsBundle = RustSdkCryptoJs.SecretsBundle.from_json(secrets);
|
1269
|
-
yield _this48.getOlmMachineOrThrow().importSecretsBundle(secretsBundle); // this method frees the SecretsBundle
|
1270
|
-
})();
|
1271
|
-
}
|
1272
|
-
|
1273
|
-
/**
|
1274
|
-
* Implementation of {@link CryptoApi#exportSecretsBundle}.
|
1275
|
-
*/
|
1276
|
-
exportSecretsBundle() {
|
1277
|
-
var _this49 = this;
|
1278
|
-
return _asyncToGenerator(function* () {
|
1279
|
-
var secretsBundle = yield _this49.getOlmMachineOrThrow().exportSecretsBundle();
|
1280
|
-
var secrets = secretsBundle.to_json();
|
1281
|
-
secretsBundle.free();
|
1282
|
-
return secrets;
|
1283
|
-
})();
|
1284
|
-
}
|
1285
|
-
|
1286
|
-
/**
|
1287
|
-
* Implementation of {@link CryptoApi#encryptToDeviceMessages}.
|
1288
|
-
*/
|
1289
|
-
encryptToDeviceMessages(eventType, devices, payload) {
|
1290
|
-
var _this50 = this;
|
1291
|
-
return _asyncToGenerator(function* () {
|
1292
|
-
var logger = new LogSpan(_this50.logger, "encryptToDeviceMessages");
|
1293
|
-
var uniqueUsers = new Set(devices.map(_ref2 => {
|
1294
|
-
var {
|
1295
|
-
userId
|
1296
|
-
} = _ref2;
|
1297
|
-
return userId;
|
1298
|
-
}));
|
1299
|
-
|
1300
|
-
// This will ensure we have Olm sessions for all of the users' devices.
|
1301
|
-
// However, we only care about some of the devices.
|
1302
|
-
// So, perhaps we can optimise this later on.
|
1303
|
-
yield _this50.keyClaimManager.ensureSessionsForUsers(logger, Array.from(uniqueUsers).map(userId => new RustSdkCryptoJs.UserId(userId)));
|
1304
|
-
var batch = {
|
1305
|
-
batch: [],
|
1306
|
-
eventType: EventType.RoomMessageEncrypted
|
1307
|
-
};
|
1308
|
-
yield Promise.all(devices.map(/*#__PURE__*/function () {
|
1309
|
-
var _ref4 = _asyncToGenerator(function* (_ref3) {
|
1310
|
-
var {
|
1311
|
-
userId,
|
1312
|
-
deviceId
|
1313
|
-
} = _ref3;
|
1314
|
-
var device = yield _this50.olmMachine.getDevice(new RustSdkCryptoJs.UserId(userId), new RustSdkCryptoJs.DeviceId(deviceId));
|
1315
|
-
if (device) {
|
1316
|
-
var encryptedPayload = JSON.parse(yield device.encryptToDeviceEvent(eventType, payload));
|
1317
|
-
batch.batch.push({
|
1318
|
-
deviceId,
|
1319
|
-
userId,
|
1320
|
-
payload: encryptedPayload
|
1321
|
-
});
|
1322
|
-
} else {
|
1323
|
-
_this50.logger.warn("encryptToDeviceMessages: unknown device ".concat(userId, ":").concat(deviceId));
|
1324
|
-
}
|
1325
|
-
});
|
1326
|
-
return function (_x) {
|
1327
|
-
return _ref4.apply(this, arguments);
|
1328
|
-
};
|
1329
|
-
}()));
|
1330
|
-
return batch;
|
1331
|
-
})();
|
1332
|
-
}
|
1333
|
-
|
1334
|
-
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
|
1335
|
-
//
|
1336
|
-
// SyncCryptoCallbacks implementation
|
1337
|
-
//
|
1338
|
-
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
|
1339
|
-
|
1340
|
-
/**
|
1341
|
-
* Apply sync changes to the olm machine
|
1342
|
-
* @param events - the received to-device messages
|
1343
|
-
* @param oneTimeKeysCounts - the received one time key counts
|
1344
|
-
* @param unusedFallbackKeys - the received unused fallback keys
|
1345
|
-
* @param devices - the received device list updates
|
1346
|
-
* @returns A list of preprocessed to-device messages.
|
1347
|
-
*/
|
1348
|
-
receiveSyncChanges(_ref5) {
|
1349
|
-
var _this51 = this;
|
1350
|
-
return _asyncToGenerator(function* () {
|
1351
|
-
var {
|
1352
|
-
events,
|
1353
|
-
oneTimeKeysCounts = new Map(),
|
1354
|
-
unusedFallbackKeys,
|
1355
|
-
devices = new RustSdkCryptoJs.DeviceLists()
|
1356
|
-
} = _ref5;
|
1357
|
-
var result = yield logDuration(logger, "receiveSyncChanges", /*#__PURE__*/_asyncToGenerator(function* () {
|
1358
|
-
return yield _this51.olmMachine.receiveSyncChanges(events ? JSON.stringify(events) : "[]", devices, oneTimeKeysCounts, unusedFallbackKeys);
|
1359
|
-
}));
|
1360
|
-
|
1361
|
-
// receiveSyncChanges returns a JSON-encoded list of decrypted to-device messages.
|
1362
|
-
return JSON.parse(result);
|
1363
|
-
})();
|
1364
|
-
}
|
1365
|
-
|
1366
|
-
/** called by the sync loop to preprocess incoming to-device messages
|
1367
|
-
*
|
1368
|
-
* @param events - the received to-device messages
|
1369
|
-
* @returns A list of preprocessed to-device messages.
|
1370
|
-
*/
|
1371
|
-
preprocessToDeviceMessages(events) {
|
1372
|
-
var _this52 = this;
|
1373
|
-
return _asyncToGenerator(function* () {
|
1374
|
-
// send the received to-device messages into receiveSyncChanges. We have no info on device-list changes,
|
1375
|
-
// one-time-keys, or fallback keys, so just pass empty data.
|
1376
|
-
var processed = yield _this52.receiveSyncChanges({
|
1377
|
-
events
|
1378
|
-
});
|
1379
|
-
|
1380
|
-
// look for interesting to-device messages
|
1381
|
-
for (var message of processed) {
|
1382
|
-
if (message.type === EventType.KeyVerificationRequest) {
|
1383
|
-
var sender = message.sender;
|
1384
|
-
var transactionId = message.content.transaction_id;
|
1385
|
-
if (transactionId && sender) {
|
1386
|
-
_this52.onIncomingKeyVerificationRequest(sender, transactionId);
|
1387
|
-
}
|
1388
|
-
}
|
1389
|
-
}
|
1390
|
-
return processed;
|
1391
|
-
})();
|
1392
|
-
}
|
1393
|
-
|
1394
|
-
/** called by the sync loop to process one time key counts and unused fallback keys
|
1395
|
-
*
|
1396
|
-
* @param oneTimeKeysCounts - the received one time key counts
|
1397
|
-
* @param unusedFallbackKeys - the received unused fallback keys
|
1398
|
-
*/
|
1399
|
-
processKeyCounts(oneTimeKeysCounts, unusedFallbackKeys) {
|
1400
|
-
var _this53 = this;
|
1401
|
-
return _asyncToGenerator(function* () {
|
1402
|
-
var mapOneTimeKeysCount = oneTimeKeysCounts && new Map(Object.entries(oneTimeKeysCounts));
|
1403
|
-
var setUnusedFallbackKeys = unusedFallbackKeys && new Set(unusedFallbackKeys);
|
1404
|
-
if (mapOneTimeKeysCount !== undefined || setUnusedFallbackKeys !== undefined) {
|
1405
|
-
yield _this53.receiveSyncChanges({
|
1406
|
-
oneTimeKeysCounts: mapOneTimeKeysCount,
|
1407
|
-
unusedFallbackKeys: setUnusedFallbackKeys
|
1408
|
-
});
|
1409
|
-
}
|
1410
|
-
})();
|
1411
|
-
}
|
1412
|
-
|
1413
|
-
/** called by the sync loop to process the notification that device lists have
|
1414
|
-
* been changed.
|
1415
|
-
*
|
1416
|
-
* @param deviceLists - device_lists field from /sync
|
1417
|
-
*/
|
1418
|
-
processDeviceLists(deviceLists) {
|
1419
|
-
var _this54 = this;
|
1420
|
-
return _asyncToGenerator(function* () {
|
1421
|
-
var _deviceLists$changed, _deviceLists$left;
|
1422
|
-
var devices = new RustSdkCryptoJs.DeviceLists((_deviceLists$changed = deviceLists.changed) === null || _deviceLists$changed === void 0 ? void 0 : _deviceLists$changed.map(userId => new RustSdkCryptoJs.UserId(userId)), (_deviceLists$left = deviceLists.left) === null || _deviceLists$left === void 0 ? void 0 : _deviceLists$left.map(userId => new RustSdkCryptoJs.UserId(userId)));
|
1423
|
-
yield _this54.receiveSyncChanges({
|
1424
|
-
devices
|
1425
|
-
});
|
1426
|
-
})();
|
1427
|
-
}
|
1428
|
-
|
1429
|
-
/** called by the sync loop on m.room.encrypted events
|
1430
|
-
*
|
1431
|
-
* @param room - in which the event was received
|
1432
|
-
* @param event - encryption event to be processed
|
1433
|
-
*/
|
1434
|
-
onCryptoEvent(room, event) {
|
1435
|
-
var _this55 = this;
|
1436
|
-
return _asyncToGenerator(function* () {
|
1437
|
-
var config = event.getContent();
|
1438
|
-
var settings = new RustSdkCryptoJs.RoomSettings();
|
1439
|
-
if (config.algorithm === "m.megolm.v1.aes-sha2") {
|
1440
|
-
settings.algorithm = RustSdkCryptoJs.EncryptionAlgorithm.MegolmV1AesSha2;
|
1441
|
-
} else {
|
1442
|
-
// Among other situations, this happens if the crypto state event is redacted.
|
1443
|
-
_this55.logger.warn("Room ".concat(room.roomId, ": ignoring crypto event with invalid algorithm ").concat(config.algorithm));
|
1444
|
-
return;
|
1445
|
-
}
|
1446
|
-
try {
|
1447
|
-
settings.sessionRotationPeriodMs = config.rotation_period_ms;
|
1448
|
-
settings.sessionRotationPeriodMessages = config.rotation_period_msgs;
|
1449
|
-
yield _this55.olmMachine.setRoomSettings(new RustSdkCryptoJs.RoomId(room.roomId), settings);
|
1450
|
-
} catch (e) {
|
1451
|
-
_this55.logger.warn("Room ".concat(room.roomId, ": ignoring crypto event which caused error: ").concat(e));
|
1452
|
-
return;
|
1453
|
-
}
|
1454
|
-
|
1455
|
-
// If we got this far, the SDK found the event acceptable.
|
1456
|
-
// We need to either create or update the active RoomEncryptor.
|
1457
|
-
var existingEncryptor = _this55.roomEncryptors[room.roomId];
|
1458
|
-
if (existingEncryptor) {
|
1459
|
-
existingEncryptor.onCryptoEvent(config);
|
1460
|
-
} else {
|
1461
|
-
_this55.roomEncryptors[room.roomId] = new RoomEncryptor(_this55.olmMachine, _this55.keyClaimManager, _this55.outgoingRequestsManager, room, config);
|
1462
|
-
}
|
1463
|
-
})();
|
1464
|
-
}
|
1465
|
-
|
1466
|
-
/** called by the sync loop after processing each sync.
|
1467
|
-
*
|
1468
|
-
* TODO: figure out something equivalent for sliding sync.
|
1469
|
-
*
|
1470
|
-
* @param syncState - information on the completed sync.
|
1471
|
-
*/
|
1472
|
-
onSyncCompleted(syncState) {
|
1473
|
-
// Processing the /sync may have produced new outgoing requests which need sending, so kick off the outgoing
|
1474
|
-
// request loop, if it's not already running.
|
1475
|
-
this.outgoingRequestsManager.doProcessOutgoingRequests().catch(e => {
|
1476
|
-
this.logger.warn("onSyncCompleted: Error processing outgoing requests", e);
|
1477
|
-
});
|
1478
|
-
}
|
1479
|
-
|
1480
|
-
/**
|
1481
|
-
* Handle an incoming m.key.verification.request event, received either in-room or in a to-device message.
|
1482
|
-
*
|
1483
|
-
* @param sender - the sender of the event
|
1484
|
-
* @param transactionId - the transaction ID for the verification. For to-device messages, this comes from the
|
1485
|
-
* content of the message; for in-room messages it is the event ID.
|
1486
|
-
*/
|
1487
|
-
onIncomingKeyVerificationRequest(sender, transactionId) {
|
1488
|
-
var request = this.olmMachine.getVerificationRequest(new RustSdkCryptoJs.UserId(sender), transactionId);
|
1489
|
-
if (request) {
|
1490
|
-
this.emit(CryptoEvent.VerificationRequestReceived, new RustVerificationRequest(this.olmMachine, request, this.outgoingRequestProcessor, this._supportedVerificationMethods));
|
1491
|
-
} else {
|
1492
|
-
// There are multiple reasons this can happen; probably the most likely is that the event is an
|
1493
|
-
// in-room event which is too old.
|
1494
|
-
this.logger.info("Ignoring just-received verification request ".concat(transactionId, " which did not start a rust-side verification"));
|
1495
|
-
}
|
1496
|
-
}
|
1497
|
-
|
1498
|
-
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
|
1499
|
-
//
|
1500
|
-
// Other public functions
|
1501
|
-
//
|
1502
|
-
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
|
1503
|
-
|
1504
|
-
/** called by the MatrixClient on a room membership event
|
1505
|
-
*
|
1506
|
-
* @param event - The matrix event which caused this event to fire.
|
1507
|
-
* @param member - The member whose RoomMember.membership changed.
|
1508
|
-
* @param oldMembership - The previous membership state. Null if it's a new member.
|
1509
|
-
*/
|
1510
|
-
onRoomMembership(event, member, oldMembership) {
|
1511
|
-
var enc = this.roomEncryptors[event.getRoomId()];
|
1512
|
-
if (!enc) {
|
1513
|
-
// not encrypting in this room
|
1514
|
-
return;
|
1515
|
-
}
|
1516
|
-
enc.onRoomMembership(member);
|
1517
|
-
}
|
1518
|
-
|
1519
|
-
/** Callback for OlmMachine.registerRoomKeyUpdatedCallback
|
1520
|
-
*
|
1521
|
-
* Called by the rust-sdk whenever there is an update to (megolm) room keys. We
|
1522
|
-
* check if we have any events waiting for the given keys, and schedule them for
|
1523
|
-
* a decryption retry if so.
|
1524
|
-
*
|
1525
|
-
* @param keys - details of the updated keys
|
1526
|
-
*/
|
1527
|
-
onRoomKeysUpdated(keys) {
|
1528
|
-
var _this56 = this;
|
1529
|
-
return _asyncToGenerator(function* () {
|
1530
|
-
for (var key of keys) {
|
1531
|
-
_this56.onRoomKeyUpdated(key);
|
1532
|
-
}
|
1533
|
-
_this56.backupManager.maybeUploadKey();
|
1534
|
-
})();
|
1535
|
-
}
|
1536
|
-
onRoomKeyUpdated(key) {
|
1537
|
-
var _this57 = this;
|
1538
|
-
if (this.stopped) return;
|
1539
|
-
this.logger.debug("Got update for session ".concat(key.sessionId, " from sender ").concat(key.senderKey.toBase64(), " in ").concat(key.roomId.toString()));
|
1540
|
-
var pendingList = this.eventDecryptor.getEventsPendingRoomKey(key.roomId.toString(), key.sessionId);
|
1541
|
-
if (pendingList.length === 0) return;
|
1542
|
-
this.logger.debug("Retrying decryption on events:", pendingList.map(e => "".concat(e.getId())));
|
1543
|
-
|
1544
|
-
// Have another go at decrypting events with this key.
|
1545
|
-
//
|
1546
|
-
// We don't want to end up blocking the callback from Rust, which could otherwise end up dropping updates,
|
1547
|
-
// so we don't wait for the decryption to complete. In any case, there is no need to wait:
|
1548
|
-
// MatrixEvent.attemptDecryption ensures that there is only one decryption attempt happening at once,
|
1549
|
-
// and deduplicates repeated attempts for the same event.
|
1550
|
-
var _loop = function _loop(ev) {
|
1551
|
-
ev.attemptDecryption(_this57, {
|
1552
|
-
isRetry: true
|
1553
|
-
}).catch(_e => {
|
1554
|
-
_this57.logger.info("Still unable to decrypt event ".concat(ev.getId(), " after receiving key"));
|
1555
|
-
});
|
1556
|
-
};
|
1557
|
-
for (var ev of pendingList) {
|
1558
|
-
_loop(ev);
|
1559
|
-
}
|
1560
|
-
}
|
1561
|
-
|
1562
|
-
/**
|
1563
|
-
* Callback for `OlmMachine.registerRoomKeyWithheldCallback`.
|
1564
|
-
*
|
1565
|
-
* Called by the rust sdk whenever we are told that a key has been withheld. We see if we had any events that
|
1566
|
-
* failed to decrypt for the given session, and update their status if so.
|
1567
|
-
*
|
1568
|
-
* @param withheld - Details of the withheld sessions.
|
1569
|
-
*/
|
1570
|
-
onRoomKeysWithheld(withheld) {
|
1571
|
-
var _this58 = this;
|
1572
|
-
return _asyncToGenerator(function* () {
|
1573
|
-
for (var session of withheld) {
|
1574
|
-
_this58.logger.debug("Got withheld message for session ".concat(session.sessionId, " in ").concat(session.roomId.toString()));
|
1575
|
-
var pendingList = _this58.eventDecryptor.getEventsPendingRoomKey(session.roomId.toString(), session.sessionId);
|
1576
|
-
if (pendingList.length === 0) return;
|
1577
|
-
|
1578
|
-
// The easiest way to update the status of the event is to have another go at decrypting it.
|
1579
|
-
_this58.logger.debug("Retrying decryption on events:", pendingList.map(e => "".concat(e.getId())));
|
1580
|
-
for (var ev of pendingList) {
|
1581
|
-
ev.attemptDecryption(_this58, {
|
1582
|
-
isRetry: true
|
1583
|
-
}).catch(_e => {
|
1584
|
-
// It's somewhat expected that we still can't decrypt here.
|
1585
|
-
});
|
1586
|
-
}
|
1587
|
-
}
|
1588
|
-
})();
|
1589
|
-
}
|
1590
|
-
|
1591
|
-
/**
|
1592
|
-
* Callback for `OlmMachine.registerUserIdentityUpdatedCallback`
|
1593
|
-
*
|
1594
|
-
* Called by the rust-sdk whenever there is an update to any user's cross-signing status. We re-check their trust
|
1595
|
-
* status and emit a `UserTrustStatusChanged` event, as well as a `KeysChanged` if it is our own identity that changed.
|
1596
|
-
*
|
1597
|
-
* @param userId - the user with the updated identity
|
1598
|
-
*/
|
1599
|
-
onUserIdentityUpdated(userId) {
|
1600
|
-
var _this59 = this;
|
1601
|
-
return _asyncToGenerator(function* () {
|
1602
|
-
var newVerification = yield _this59.getUserVerificationStatus(userId.toString());
|
1603
|
-
_this59.emit(CryptoEvent.UserTrustStatusChanged, userId.toString(), newVerification);
|
1604
|
-
|
1605
|
-
// If our own user identity has changed, we may now trust the key backup where we did not before.
|
1606
|
-
// So, re-check the key backup status and enable it if available.
|
1607
|
-
if (userId.toString() === _this59.userId) {
|
1608
|
-
_this59.emit(CryptoEvent.KeysChanged, {});
|
1609
|
-
yield _this59.checkKeyBackupAndEnable();
|
1610
|
-
}
|
1611
|
-
})();
|
1612
|
-
}
|
1613
|
-
|
1614
|
-
/**
|
1615
|
-
* Callback for `OlmMachine.registerDevicesUpdatedCallback`
|
1616
|
-
*
|
1617
|
-
* Called when users' devices have updated. Emits `WillUpdateDevices` and `DevicesUpdated`. In the JavaScript
|
1618
|
-
* crypto backend, these events are called at separate times, with `WillUpdateDevices` being emitted just before
|
1619
|
-
* the devices are saved, and `DevicesUpdated` being emitted just after. But the OlmMachine only gives us
|
1620
|
-
* one event, so we emit both events here.
|
1621
|
-
*
|
1622
|
-
* @param userIds - an array of user IDs of users whose devices have updated.
|
1623
|
-
*/
|
1624
|
-
onDevicesUpdated(userIds) {
|
1625
|
-
var _this60 = this;
|
1626
|
-
return _asyncToGenerator(function* () {
|
1627
|
-
_this60.emit(CryptoEvent.WillUpdateDevices, userIds, false);
|
1628
|
-
_this60.emit(CryptoEvent.DevicesUpdated, userIds, false);
|
1629
|
-
})();
|
1630
|
-
}
|
1631
|
-
|
1632
|
-
/**
|
1633
|
-
* Handles secret received from the rust secret inbox.
|
1634
|
-
*
|
1635
|
-
* The gossipped secrets are received using the `m.secret.send` event type
|
1636
|
-
* and are guaranteed to have been received over a 1-to-1 Olm
|
1637
|
-
* Session from a verified device.
|
1638
|
-
*
|
1639
|
-
* The only secret currently handled in this way is `m.megolm_backup.v1`.
|
1640
|
-
*
|
1641
|
-
* @param name - the secret name
|
1642
|
-
* @param value - the secret value
|
1643
|
-
*/
|
1644
|
-
handleSecretReceived(name, value) {
|
1645
|
-
var _this61 = this;
|
1646
|
-
return _asyncToGenerator(function* () {
|
1647
|
-
_this61.logger.debug("onReceiveSecret: Received secret ".concat(name));
|
1648
|
-
if (name === "m.megolm_backup.v1") {
|
1649
|
-
return yield _this61.backupManager.handleBackupSecretReceived(value);
|
1650
|
-
// XXX at this point we should probably try to download the backup and import the keys,
|
1651
|
-
// or at least retry for the current decryption failures?
|
1652
|
-
// Maybe add some signaling when a new secret is received, and let clients handle it?
|
1653
|
-
// as it's where the restore from backup APIs are exposed.
|
1654
|
-
}
|
1655
|
-
return false;
|
1656
|
-
})();
|
1657
|
-
}
|
1658
|
-
|
1659
|
-
/**
|
1660
|
-
* Called when a new secret is received in the rust secret inbox.
|
1661
|
-
*
|
1662
|
-
* Will poll the secret inbox and handle the secrets received.
|
1663
|
-
*
|
1664
|
-
* @param name - The name of the secret received.
|
1665
|
-
*/
|
1666
|
-
checkSecrets(name) {
|
1667
|
-
var _this62 = this;
|
1668
|
-
return _asyncToGenerator(function* () {
|
1669
|
-
var pendingValues = yield _this62.olmMachine.getSecretsFromInbox(name);
|
1670
|
-
for (var value of pendingValues) {
|
1671
|
-
if (yield _this62.handleSecretReceived(name, value)) {
|
1672
|
-
// If we have a valid secret for that name there is no point of processing the other secrets values.
|
1673
|
-
// It's probably the same secret shared by another device.
|
1674
|
-
break;
|
1675
|
-
}
|
1676
|
-
}
|
1677
|
-
|
1678
|
-
// Important to call this after handling the secrets as good hygiene.
|
1679
|
-
yield _this62.olmMachine.deleteSecretsFromInbox(name);
|
1680
|
-
})();
|
1681
|
-
}
|
1682
|
-
|
1683
|
-
/**
|
1684
|
-
* Handle a live event received via /sync.
|
1685
|
-
* See {@link ClientEventHandlerMap#event}
|
1686
|
-
*
|
1687
|
-
* @param event - live event
|
1688
|
-
*/
|
1689
|
-
onLiveEventFromSync(event) {
|
1690
|
-
var _this63 = this;
|
1691
|
-
return _asyncToGenerator(function* () {
|
1692
|
-
// Ignore state event or remote echo
|
1693
|
-
// transaction_id is provided in case of remote echo {@link https://spec.matrix.org/v1.7/client-server-api/#local-echo}
|
1694
|
-
if (event.isState() || !!event.getUnsigned().transaction_id) return;
|
1695
|
-
var processEvent = /*#__PURE__*/function () {
|
1696
|
-
var _ref7 = _asyncToGenerator(function* (evt) {
|
1697
|
-
// Process only verification event
|
1698
|
-
if (isVerificationEvent(event)) {
|
1699
|
-
yield _this63.onKeyVerificationEvent(evt);
|
1700
|
-
}
|
1701
|
-
});
|
1702
|
-
return function processEvent(_x2) {
|
1703
|
-
return _ref7.apply(this, arguments);
|
1704
|
-
};
|
1705
|
-
}();
|
1706
|
-
|
1707
|
-
// If the event is encrypted of in failure, we wait for decryption
|
1708
|
-
if (event.isDecryptionFailure() || event.isEncrypted()) {
|
1709
|
-
// 5 mins
|
1710
|
-
var TIMEOUT_DELAY = 5 * 60 * 1000;
|
1711
|
-
|
1712
|
-
// After 5mins, we are not expecting the event to be decrypted
|
1713
|
-
var timeoutId = setTimeout(() => event.off(MatrixEventEvent.Decrypted, onDecrypted), TIMEOUT_DELAY);
|
1714
|
-
var onDecrypted = (decryptedEvent, error) => {
|
1715
|
-
if (error) return;
|
1716
|
-
clearTimeout(timeoutId);
|
1717
|
-
event.off(MatrixEventEvent.Decrypted, onDecrypted);
|
1718
|
-
processEvent(decryptedEvent);
|
1719
|
-
};
|
1720
|
-
event.on(MatrixEventEvent.Decrypted, onDecrypted);
|
1721
|
-
} else {
|
1722
|
-
yield processEvent(event);
|
1723
|
-
}
|
1724
|
-
})();
|
1725
|
-
}
|
1726
|
-
|
1727
|
-
/**
|
1728
|
-
* Handle an in-room key verification event.
|
1729
|
-
*
|
1730
|
-
* @param event - a key validation request event.
|
1731
|
-
*/
|
1732
|
-
onKeyVerificationEvent(event) {
|
1733
|
-
var _this64 = this;
|
1734
|
-
return _asyncToGenerator(function* () {
|
1735
|
-
var roomId = event.getRoomId();
|
1736
|
-
if (!roomId) {
|
1737
|
-
throw new Error("missing roomId in the event");
|
1738
|
-
}
|
1739
|
-
_this64.logger.debug("Incoming verification event ".concat(event.getId(), " type ").concat(event.getType(), " from ").concat(event.getSender()));
|
1740
|
-
yield _this64.olmMachine.receiveVerificationEvent(JSON.stringify({
|
1741
|
-
event_id: event.getId(),
|
1742
|
-
type: event.getType(),
|
1743
|
-
sender: event.getSender(),
|
1744
|
-
state_key: event.getStateKey(),
|
1745
|
-
content: event.getContent(),
|
1746
|
-
origin_server_ts: event.getTs()
|
1747
|
-
}), new RustSdkCryptoJs.RoomId(roomId));
|
1748
|
-
if (event.getType() === EventType.RoomMessage && event.getContent().msgtype === MsgType.KeyVerificationRequest) {
|
1749
|
-
_this64.onIncomingKeyVerificationRequest(event.getSender(), event.getId());
|
1750
|
-
}
|
1751
|
-
|
1752
|
-
// that may have caused us to queue up outgoing requests, so make sure we send them.
|
1753
|
-
_this64.outgoingRequestsManager.doProcessOutgoingRequests().catch(e => {
|
1754
|
-
_this64.logger.warn("onKeyVerificationRequest: Error processing outgoing requests", e);
|
1755
|
-
});
|
1756
|
-
})();
|
1757
|
-
}
|
1758
|
-
|
1759
|
-
/**
|
1760
|
-
* Returns the cross-signing user identity of the current user.
|
1761
|
-
*
|
1762
|
-
* Not part of the public crypto-api interface.
|
1763
|
-
* Used during migration from legacy js-crypto to update local trust if needed.
|
1764
|
-
*/
|
1765
|
-
getOwnIdentity() {
|
1766
|
-
var _this65 = this;
|
1767
|
-
return _asyncToGenerator(function* () {
|
1768
|
-
return yield _this65.olmMachine.getIdentity(new RustSdkCryptoJs.UserId(_this65.userId));
|
1769
|
-
})();
|
1770
|
-
}
|
1771
|
-
}
|
1772
|
-
class EventDecryptor {
|
1773
|
-
constructor(logger, olmMachine, perSessionBackupDownloader) {
|
1774
|
-
this.logger = logger;
|
1775
|
-
this.olmMachine = olmMachine;
|
1776
|
-
this.perSessionBackupDownloader = perSessionBackupDownloader;
|
1777
|
-
/**
|
1778
|
-
* Events which we couldn't decrypt due to unknown sessions / indexes.
|
1779
|
-
*
|
1780
|
-
* Map from roomId to sessionId to Set of MatrixEvents
|
1781
|
-
*/
|
1782
|
-
_defineProperty(this, "eventsPendingKey", new MapWithDefault(() => new MapWithDefault(() => new Set())));
|
1783
|
-
}
|
1784
|
-
attemptEventDecryption(event, isolationMode) {
|
1785
|
-
var _this66 = this;
|
1786
|
-
return _asyncToGenerator(function* () {
|
1787
|
-
// add the event to the pending list *before* attempting to decrypt.
|
1788
|
-
// then, if the key turns up while decryption is in progress (and
|
1789
|
-
// decryption fails), we will schedule a retry.
|
1790
|
-
// (fixes https://github.com/vector-im/element-web/issues/5001)
|
1791
|
-
_this66.addEventToPendingList(event);
|
1792
|
-
var trustRequirement;
|
1793
|
-
switch (isolationMode.kind) {
|
1794
|
-
case DeviceIsolationModeKind.AllDevicesIsolationMode:
|
1795
|
-
trustRequirement = RustSdkCryptoJs.TrustRequirement.Untrusted;
|
1796
|
-
break;
|
1797
|
-
case DeviceIsolationModeKind.OnlySignedDevicesIsolationMode:
|
1798
|
-
trustRequirement = RustSdkCryptoJs.TrustRequirement.CrossSignedOrLegacy;
|
1799
|
-
break;
|
1800
|
-
}
|
1801
|
-
try {
|
1802
|
-
var res = yield _this66.olmMachine.decryptRoomEvent(stringifyEvent(event), new RustSdkCryptoJs.RoomId(event.getRoomId()), new RustSdkCryptoJs.DecryptionSettings(trustRequirement));
|
1803
|
-
|
1804
|
-
// Success. We can remove the event from the pending list, if
|
1805
|
-
// that hasn't already happened.
|
1806
|
-
_this66.removeEventFromPendingList(event);
|
1807
|
-
return {
|
1808
|
-
clearEvent: JSON.parse(res.event),
|
1809
|
-
claimedEd25519Key: res.senderClaimedEd25519Key,
|
1810
|
-
senderCurve25519Key: res.senderCurve25519Key,
|
1811
|
-
forwardingCurve25519KeyChain: res.forwardingCurve25519KeyChain
|
1812
|
-
};
|
1813
|
-
} catch (err) {
|
1814
|
-
if (err instanceof RustSdkCryptoJs.MegolmDecryptionError) {
|
1815
|
-
_this66.onMegolmDecryptionError(event, err, yield _this66.perSessionBackupDownloader.getServerBackupInfo());
|
1816
|
-
} else {
|
1817
|
-
throw new DecryptionError(DecryptionFailureCode.UNKNOWN_ERROR, "Unknown error");
|
1818
|
-
}
|
1819
|
-
}
|
1820
|
-
})();
|
1821
|
-
}
|
1822
|
-
|
1823
|
-
/**
|
1824
|
-
* Handle a `MegolmDecryptionError` returned by the rust SDK.
|
1825
|
-
*
|
1826
|
-
* Fires off a request to the `perSessionBackupDownloader`, if appropriate, and then throws a `DecryptionError`.
|
1827
|
-
*
|
1828
|
-
* @param event - The event which could not be decrypted.
|
1829
|
-
* @param err - The error from the Rust SDK.
|
1830
|
-
* @param serverBackupInfo - Details about the current backup from the server. `null` if there is no backup.
|
1831
|
-
* `undefined` if our attempt to check failed.
|
1832
|
-
*/
|
1833
|
-
onMegolmDecryptionError(event, err, serverBackupInfo) {
|
1834
|
-
var content = event.getWireContent();
|
1835
|
-
var errorDetails = {
|
1836
|
-
sender_key: content.sender_key,
|
1837
|
-
session_id: content.session_id
|
1838
|
-
};
|
1839
|
-
|
1840
|
-
// If the error looks like it might be recoverable from backup, queue up a request to try that.
|
1841
|
-
if (err.code === RustSdkCryptoJs.DecryptionErrorCode.MissingRoomKey || err.code === RustSdkCryptoJs.DecryptionErrorCode.UnknownMessageIndex) {
|
1842
|
-
this.perSessionBackupDownloader.onDecryptionKeyMissingError(event.getRoomId(), content.session_id);
|
1843
|
-
|
1844
|
-
// If the server is telling us our membership at the time the event
|
1845
|
-
// was sent, and it isn't "join", we use a different error code.
|
1846
|
-
var membership = event.getMembershipAtEvent();
|
1847
|
-
if (membership && membership !== KnownMembership.Join && membership !== KnownMembership.Invite) {
|
1848
|
-
throw new DecryptionError(DecryptionFailureCode.HISTORICAL_MESSAGE_USER_NOT_JOINED, "This message was sent when we were not a member of the room.", errorDetails);
|
1849
|
-
}
|
1850
|
-
|
1851
|
-
// If the event was sent before this device was created, we use some different error codes.
|
1852
|
-
if (event.getTs() <= this.olmMachine.deviceCreationTimeMs) {
|
1853
|
-
if (serverBackupInfo === null) {
|
1854
|
-
throw new DecryptionError(DecryptionFailureCode.HISTORICAL_MESSAGE_NO_KEY_BACKUP, "This message was sent before this device logged in, and there is no key backup on the server.", errorDetails);
|
1855
|
-
} else if (!this.perSessionBackupDownloader.isKeyBackupDownloadConfigured()) {
|
1856
|
-
throw new DecryptionError(DecryptionFailureCode.HISTORICAL_MESSAGE_BACKUP_UNCONFIGURED, "This message was sent before this device logged in, and key backup is not working.", errorDetails);
|
1857
|
-
} else {
|
1858
|
-
throw new DecryptionError(DecryptionFailureCode.HISTORICAL_MESSAGE_WORKING_BACKUP, "This message was sent before this device logged in. Key backup is working, but we still do not (yet) have the key.", errorDetails);
|
1859
|
-
}
|
1860
|
-
}
|
1861
|
-
}
|
1862
|
-
|
1863
|
-
// If we got a withheld code, expose that.
|
1864
|
-
if (err.maybe_withheld) {
|
1865
|
-
// Unfortunately the Rust SDK API doesn't let us distinguish between different withheld cases, other than
|
1866
|
-
// by string-matching.
|
1867
|
-
var failureCode = err.maybe_withheld === "The sender has disabled encrypting to unverified devices." ? DecryptionFailureCode.MEGOLM_KEY_WITHHELD_FOR_UNVERIFIED_DEVICE : DecryptionFailureCode.MEGOLM_KEY_WITHHELD;
|
1868
|
-
throw new DecryptionError(failureCode, err.maybe_withheld, errorDetails);
|
1869
|
-
}
|
1870
|
-
switch (err.code) {
|
1871
|
-
case RustSdkCryptoJs.DecryptionErrorCode.MissingRoomKey:
|
1872
|
-
throw new DecryptionError(DecryptionFailureCode.MEGOLM_UNKNOWN_INBOUND_SESSION_ID, "The sender's device has not sent us the keys for this message.", errorDetails);
|
1873
|
-
case RustSdkCryptoJs.DecryptionErrorCode.UnknownMessageIndex:
|
1874
|
-
throw new DecryptionError(DecryptionFailureCode.OLM_UNKNOWN_MESSAGE_INDEX, "The sender's device has not sent us the keys for this message at this index.", errorDetails);
|
1875
|
-
case RustSdkCryptoJs.DecryptionErrorCode.SenderIdentityPreviouslyVerified:
|
1876
|
-
// We're refusing to decrypt due to not trusting the sender,
|
1877
|
-
// rather than failing to decrypt due to lack of keys, so we
|
1878
|
-
// don't need to keep it on the pending list.
|
1879
|
-
this.removeEventFromPendingList(event);
|
1880
|
-
throw new DecryptionError(DecryptionFailureCode.SENDER_IDENTITY_PREVIOUSLY_VERIFIED, "The sender identity is unverified, but was previously verified.");
|
1881
|
-
case RustSdkCryptoJs.DecryptionErrorCode.UnknownSenderDevice:
|
1882
|
-
// We're refusing to decrypt due to not trusting the sender,
|
1883
|
-
// rather than failing to decrypt due to lack of keys, so we
|
1884
|
-
// don't need to keep it on the pending list.
|
1885
|
-
this.removeEventFromPendingList(event);
|
1886
|
-
throw new DecryptionError(DecryptionFailureCode.UNKNOWN_SENDER_DEVICE, "The sender device is not known.");
|
1887
|
-
case RustSdkCryptoJs.DecryptionErrorCode.UnsignedSenderDevice:
|
1888
|
-
// We're refusing to decrypt due to not trusting the sender,
|
1889
|
-
// rather than failing to decrypt due to lack of keys, so we
|
1890
|
-
// don't need to keep it on the pending list.
|
1891
|
-
this.removeEventFromPendingList(event);
|
1892
|
-
throw new DecryptionError(DecryptionFailureCode.UNSIGNED_SENDER_DEVICE, "The sender identity is not cross-signed.");
|
1893
|
-
|
1894
|
-
// We don't map MismatchedIdentityKeys for now, as there is no equivalent in legacy.
|
1895
|
-
// Just put it on the `UNKNOWN_ERROR` bucket.
|
1896
|
-
default:
|
1897
|
-
throw new DecryptionError(DecryptionFailureCode.UNKNOWN_ERROR, err.description, errorDetails);
|
1898
|
-
}
|
1899
|
-
}
|
1900
|
-
getEncryptionInfoForEvent(event) {
|
1901
|
-
var _this67 = this;
|
1902
|
-
return _asyncToGenerator(function* () {
|
1903
|
-
if (!event.getClearContent() || event.isDecryptionFailure()) {
|
1904
|
-
// not successfully decrypted
|
1905
|
-
return null;
|
1906
|
-
}
|
1907
|
-
|
1908
|
-
// special-case outgoing events, which the rust crypto-sdk will barf on
|
1909
|
-
if (event.status !== null) {
|
1910
|
-
return {
|
1911
|
-
shieldColour: EventShieldColour.NONE,
|
1912
|
-
shieldReason: null
|
1913
|
-
};
|
1914
|
-
}
|
1915
|
-
var encryptionInfo = yield _this67.olmMachine.getRoomEventEncryptionInfo(stringifyEvent(event), new RustSdkCryptoJs.RoomId(event.getRoomId()));
|
1916
|
-
return rustEncryptionInfoToJsEncryptionInfo(_this67.logger, encryptionInfo);
|
1917
|
-
})();
|
1918
|
-
}
|
1919
|
-
|
1920
|
-
/**
|
1921
|
-
* Look for events which are waiting for a given megolm session
|
1922
|
-
*
|
1923
|
-
* Returns a list of events which were encrypted by `session` and could not be decrypted
|
1924
|
-
*/
|
1925
|
-
getEventsPendingRoomKey(roomId, sessionId) {
|
1926
|
-
var roomPendingEvents = this.eventsPendingKey.get(roomId);
|
1927
|
-
if (!roomPendingEvents) return [];
|
1928
|
-
var sessionPendingEvents = roomPendingEvents.get(sessionId);
|
1929
|
-
if (!sessionPendingEvents) return [];
|
1930
|
-
return [...sessionPendingEvents];
|
1931
|
-
}
|
1932
|
-
|
1933
|
-
/**
|
1934
|
-
* Add an event to the list of those awaiting their session keys.
|
1935
|
-
*/
|
1936
|
-
addEventToPendingList(event) {
|
1937
|
-
var roomId = event.getRoomId();
|
1938
|
-
// We shouldn't have events without a room id here.
|
1939
|
-
if (!roomId) return;
|
1940
|
-
var roomPendingEvents = this.eventsPendingKey.getOrCreate(roomId);
|
1941
|
-
var sessionPendingEvents = roomPendingEvents.getOrCreate(event.getWireContent().session_id);
|
1942
|
-
sessionPendingEvents.add(event);
|
1943
|
-
}
|
1944
|
-
|
1945
|
-
/**
|
1946
|
-
* Remove an event from the list of those awaiting their session keys.
|
1947
|
-
*/
|
1948
|
-
removeEventFromPendingList(event) {
|
1949
|
-
var roomId = event.getRoomId();
|
1950
|
-
if (!roomId) return;
|
1951
|
-
var roomPendingEvents = this.eventsPendingKey.getOrCreate(roomId);
|
1952
|
-
if (!roomPendingEvents) return;
|
1953
|
-
var sessionPendingEvents = roomPendingEvents.get(event.getWireContent().session_id);
|
1954
|
-
if (!sessionPendingEvents) return;
|
1955
|
-
sessionPendingEvents.delete(event);
|
1956
|
-
|
1957
|
-
// also clean up the higher-level maps if they are now empty
|
1958
|
-
if (sessionPendingEvents.size === 0) {
|
1959
|
-
roomPendingEvents.delete(event.getWireContent().session_id);
|
1960
|
-
if (roomPendingEvents.size === 0) {
|
1961
|
-
this.eventsPendingKey.delete(roomId);
|
1962
|
-
}
|
1963
|
-
}
|
1964
|
-
}
|
1965
|
-
}
|
1966
|
-
function stringifyEvent(event) {
|
1967
|
-
return JSON.stringify({
|
1968
|
-
event_id: event.getId(),
|
1969
|
-
type: event.getWireType(),
|
1970
|
-
sender: event.getSender(),
|
1971
|
-
state_key: event.getStateKey(),
|
1972
|
-
content: event.getWireContent(),
|
1973
|
-
origin_server_ts: event.getTs()
|
1974
|
-
});
|
1975
|
-
}
|
1976
|
-
function rustEncryptionInfoToJsEncryptionInfo(logger, encryptionInfo) {
|
1977
|
-
if (encryptionInfo === undefined) {
|
1978
|
-
// not decrypted here
|
1979
|
-
return null;
|
1980
|
-
}
|
1981
|
-
|
1982
|
-
// TODO: use strict shield semantics.
|
1983
|
-
var shieldState = encryptionInfo.shieldState(false);
|
1984
|
-
var shieldColour;
|
1985
|
-
switch (shieldState.color) {
|
1986
|
-
case RustSdkCryptoJs.ShieldColor.Grey:
|
1987
|
-
shieldColour = EventShieldColour.GREY;
|
1988
|
-
break;
|
1989
|
-
case RustSdkCryptoJs.ShieldColor.None:
|
1990
|
-
shieldColour = EventShieldColour.NONE;
|
1991
|
-
break;
|
1992
|
-
default:
|
1993
|
-
shieldColour = EventShieldColour.RED;
|
1994
|
-
}
|
1995
|
-
var shieldReason;
|
1996
|
-
if (shieldState.message === undefined) {
|
1997
|
-
shieldReason = null;
|
1998
|
-
} else if (shieldState.message === "Encrypted by an unverified user.") {
|
1999
|
-
// this case isn't actually used with lax shield semantics.
|
2000
|
-
shieldReason = EventShieldReason.UNVERIFIED_IDENTITY;
|
2001
|
-
} else if (shieldState.message === "Encrypted by a device not verified by its owner.") {
|
2002
|
-
shieldReason = EventShieldReason.UNSIGNED_DEVICE;
|
2003
|
-
} else if (shieldState.message === "The authenticity of this encrypted message can't be guaranteed on this device.") {
|
2004
|
-
shieldReason = EventShieldReason.AUTHENTICITY_NOT_GUARANTEED;
|
2005
|
-
} else if (shieldState.message === "Encrypted by an unknown or deleted device.") {
|
2006
|
-
shieldReason = EventShieldReason.UNKNOWN_DEVICE;
|
2007
|
-
} else {
|
2008
|
-
logger.warn("Unknown shield state message '".concat(shieldState.message, "'"));
|
2009
|
-
shieldReason = EventShieldReason.UNKNOWN;
|
2010
|
-
}
|
2011
|
-
return {
|
2012
|
-
shieldColour,
|
2013
|
-
shieldReason
|
2014
|
-
};
|
2015
|
-
}
|
2016
|
-
//# sourceMappingURL=rust-crypto.js.map
|