@unwanted/matrix-sdk-mini 34.12.0 → 36.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/git-revision.txt +1 -1
- package/lib/@types/event.d.ts +25 -19
- package/lib/@types/event.d.ts.map +1 -1
- package/lib/@types/event.js +5 -0
- package/lib/@types/event.js.map +1 -1
- package/lib/@types/global.d.js +0 -2
- package/lib/@types/global.d.js.map +1 -1
- package/lib/autodiscovery.d.ts +1 -1
- package/lib/autodiscovery.d.ts.map +1 -1
- package/lib/autodiscovery.js.map +1 -1
- package/lib/base64.d.ts +3 -6
- package/lib/base64.d.ts.map +1 -1
- package/lib/base64.js +43 -36
- package/lib/base64.js.map +1 -1
- package/lib/browser-index.d.ts.map +1 -1
- package/lib/browser-index.js +0 -11
- package/lib/browser-index.js.map +1 -1
- package/lib/client.d.ts +45 -1306
- package/lib/client.d.ts.map +1 -1
- package/lib/client.js +406 -2963
- package/lib/client.js.map +1 -1
- package/lib/digest.d.ts +2 -2
- package/lib/digest.d.ts.map +1 -1
- package/lib/digest.js +2 -2
- package/lib/digest.js.map +1 -1
- package/lib/embedded.d.ts +2 -23
- package/lib/embedded.d.ts.map +1 -1
- package/lib/embedded.js +82 -209
- package/lib/embedded.js.map +1 -1
- package/lib/event-mapper.d.ts.map +1 -1
- package/lib/event-mapper.js +0 -4
- package/lib/event-mapper.js.map +1 -1
- package/lib/feature.d.ts.map +1 -1
- package/lib/feature.js +2 -1
- package/lib/feature.js.map +1 -1
- package/lib/http-api/errors.d.ts +3 -3
- package/lib/http-api/errors.js +3 -3
- package/lib/http-api/errors.js.map +1 -1
- package/lib/http-api/utils.js +2 -2
- package/lib/http-api/utils.js.map +1 -1
- package/lib/matrix.d.ts +0 -25
- package/lib/matrix.d.ts.map +1 -1
- package/lib/matrix.js +1 -30
- package/lib/matrix.js.map +1 -1
- package/lib/models/MSC3089Branch.d.ts.map +1 -1
- package/lib/models/MSC3089Branch.js +0 -3
- package/lib/models/MSC3089Branch.js.map +1 -1
- package/lib/models/event-timeline-set.d.ts +6 -10
- package/lib/models/event-timeline-set.d.ts.map +1 -1
- package/lib/models/event-timeline-set.js +28 -36
- package/lib/models/event-timeline-set.js.map +1 -1
- package/lib/models/event-timeline.d.ts +7 -2
- package/lib/models/event-timeline.d.ts.map +1 -1
- package/lib/models/event-timeline.js +9 -30
- package/lib/models/event-timeline.js.map +1 -1
- package/lib/models/event.d.ts +12 -96
- package/lib/models/event.d.ts.map +1 -1
- package/lib/models/event.js +59 -286
- package/lib/models/event.js.map +1 -1
- package/lib/models/invites-ignorer-types.d.ts +27 -0
- package/lib/models/invites-ignorer-types.d.ts.map +1 -0
- package/lib/models/invites-ignorer-types.js +36 -0
- package/lib/models/invites-ignorer-types.js.map +1 -0
- package/lib/models/invites-ignorer.d.ts +2 -26
- package/lib/models/invites-ignorer.d.ts.map +1 -1
- package/lib/models/invites-ignorer.js +2 -27
- package/lib/models/invites-ignorer.js.map +1 -1
- package/lib/models/poll.d.ts.map +1 -1
- package/lib/models/poll.js +1 -5
- package/lib/models/poll.js.map +1 -1
- package/lib/models/relations-container.d.ts.map +1 -1
- package/lib/models/relations-container.js +1 -7
- package/lib/models/relations-container.js.map +1 -1
- package/lib/models/relations.d.ts +0 -1
- package/lib/models/relations.d.ts.map +1 -1
- package/lib/models/relations.js +0 -8
- package/lib/models/relations.js.map +1 -1
- package/lib/models/room-member.d.ts +6 -1
- package/lib/models/room-member.d.ts.map +1 -1
- package/lib/models/room-member.js +7 -1
- package/lib/models/room-member.js.map +1 -1
- package/lib/models/room-state.d.ts +2 -13
- package/lib/models/room-state.d.ts.map +1 -1
- package/lib/models/room-state.js +12 -56
- package/lib/models/room-state.js.map +1 -1
- package/lib/models/room.d.ts +8 -21
- package/lib/models/room.d.ts.map +1 -1
- package/lib/models/room.js +128 -163
- package/lib/models/room.js.map +1 -1
- package/lib/models/thread.d.ts.map +1 -1
- package/lib/models/thread.js +5 -4
- package/lib/models/thread.js.map +1 -1
- package/lib/oidc/authorize.d.ts +2 -2
- package/lib/oidc/authorize.d.ts.map +1 -1
- package/lib/oidc/authorize.js +5 -5
- package/lib/oidc/authorize.js.map +1 -1
- package/lib/oidc/discovery.d.ts +8 -0
- package/lib/oidc/discovery.d.ts.map +1 -1
- package/lib/oidc/discovery.js +22 -11
- package/lib/oidc/discovery.js.map +1 -1
- package/lib/oidc/index.d.ts +3 -4
- package/lib/oidc/index.d.ts.map +1 -1
- package/lib/oidc/index.js.map +1 -1
- package/lib/oidc/register.js +3 -3
- package/lib/oidc/register.js.map +1 -1
- package/lib/oidc/tokenRefresher.d.ts.map +1 -1
- package/lib/oidc/tokenRefresher.js +6 -5
- package/lib/oidc/tokenRefresher.js.map +1 -1
- package/lib/oidc/validate.d.ts +9 -23
- package/lib/oidc/validate.d.ts.map +1 -1
- package/lib/oidc/validate.js +13 -28
- package/lib/oidc/validate.js.map +1 -1
- package/lib/randomstring.d.ts +30 -3
- package/lib/randomstring.d.ts.map +1 -1
- package/lib/randomstring.js +68 -16
- package/lib/randomstring.js.map +1 -1
- package/lib/sliding-sync-sdk.d.ts +3 -4
- package/lib/sliding-sync-sdk.d.ts.map +1 -1
- package/lib/sliding-sync-sdk.js +55 -102
- package/lib/sliding-sync-sdk.js.map +1 -1
- package/lib/sliding-sync.js +9 -6
- package/lib/sliding-sync.js.map +1 -1
- package/lib/store/indexeddb-local-backend.js +4 -2
- package/lib/store/indexeddb-local-backend.js.map +1 -1
- package/lib/store/indexeddb.d.ts +1 -1
- package/lib/store/indexeddb.d.ts.map +1 -1
- package/lib/store/indexeddb.js.map +1 -1
- package/lib/sync-accumulator.d.ts +6 -4
- package/lib/sync-accumulator.d.ts.map +1 -1
- package/lib/sync-accumulator.js +23 -12
- package/lib/sync-accumulator.js.map +1 -1
- package/lib/sync.d.ts +10 -13
- package/lib/sync.d.ts.map +1 -1
- package/lib/sync.js +94 -115
- package/lib/sync.js.map +1 -1
- package/lib/testing.d.ts +13 -44
- package/lib/testing.d.ts.map +1 -1
- package/lib/testing.js +36 -99
- package/lib/testing.js.map +1 -1
- package/lib/types.d.ts +0 -1
- package/lib/types.d.ts.map +1 -1
- package/lib/types.js.map +1 -1
- package/package.json +14 -15
- package/src/@types/event.ts +19 -36
- package/src/@types/global.d.ts +21 -4
- package/src/autodiscovery.ts +1 -1
- package/src/base64.ts +38 -40
- package/src/browser-index.ts +0 -11
- package/src/client.ts +175 -3136
- package/src/digest.ts +3 -3
- package/src/embedded.ts +43 -149
- package/src/event-mapper.ts +0 -4
- package/src/feature.ts +1 -0
- package/src/http-api/errors.ts +3 -3
- package/src/http-api/utils.ts +2 -2
- package/src/matrix.ts +0 -41
- package/src/models/MSC3089Branch.ts +0 -3
- package/src/models/event-timeline-set.ts +17 -38
- package/src/models/event-timeline.ts +11 -26
- package/src/models/event.ts +54 -295
- package/src/models/invites-ignorer-types.ts +48 -0
- package/src/models/invites-ignorer.ts +7 -42
- package/src/models/poll.ts +0 -6
- package/src/models/relations-container.ts +1 -8
- package/src/models/relations.ts +0 -8
- package/src/models/room-member.ts +16 -1
- package/src/models/room-state.ts +4 -37
- package/src/models/room.ts +34 -69
- package/src/models/thread.ts +4 -3
- package/src/oidc/authorize.ts +7 -7
- package/src/oidc/discovery.ts +16 -10
- package/src/oidc/index.ts +3 -4
- package/src/oidc/register.ts +3 -3
- package/src/oidc/tokenRefresher.ts +3 -2
- package/src/oidc/validate.ts +40 -63
- package/src/randomstring.ts +65 -19
- package/src/sliding-sync-sdk.ts +10 -83
- package/src/sliding-sync.ts +6 -6
- package/src/store/indexeddb-local-backend.ts +2 -2
- package/src/store/indexeddb.ts +1 -1
- package/src/sync-accumulator.ts +33 -16
- package/src/sync.ts +112 -143
- package/src/testing.ts +36 -103
- package/src/types.ts +0 -1
- package/CHANGELOG.md +0 -5910
- package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
- package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
- package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
- package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
- package/lib/@types/crypto.d.ts +0 -47
- package/lib/@types/crypto.d.ts.map +0 -1
- package/lib/@types/crypto.js +0 -1
- package/lib/@types/crypto.js.map +0 -1
- package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
- package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
- package/lib/common-crypto/CryptoBackend.d.ts +0 -240
- package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
- package/lib/common-crypto/CryptoBackend.js +0 -73
- package/lib/common-crypto/CryptoBackend.js.map +0 -1
- package/lib/common-crypto/key-passphrase.d.ts +0 -14
- package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
- package/lib/common-crypto/key-passphrase.js +0 -33
- package/lib/common-crypto/key-passphrase.js.map +0 -1
- package/lib/crypto/CrossSigning.d.ts +0 -184
- package/lib/crypto/CrossSigning.d.ts.map +0 -1
- package/lib/crypto/CrossSigning.js +0 -718
- package/lib/crypto/CrossSigning.js.map +0 -1
- package/lib/crypto/DeviceList.d.ts +0 -216
- package/lib/crypto/DeviceList.d.ts.map +0 -1
- package/lib/crypto/DeviceList.js +0 -892
- package/lib/crypto/DeviceList.js.map +0 -1
- package/lib/crypto/EncryptionSetup.d.ts +0 -152
- package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
- package/lib/crypto/EncryptionSetup.js +0 -356
- package/lib/crypto/EncryptionSetup.js.map +0 -1
- package/lib/crypto/OlmDevice.d.ts +0 -457
- package/lib/crypto/OlmDevice.d.ts.map +0 -1
- package/lib/crypto/OlmDevice.js +0 -1241
- package/lib/crypto/OlmDevice.js.map +0 -1
- package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
- package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
- package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
- package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
- package/lib/crypto/RoomList.d.ts +0 -26
- package/lib/crypto/RoomList.d.ts.map +0 -1
- package/lib/crypto/RoomList.js +0 -71
- package/lib/crypto/RoomList.js.map +0 -1
- package/lib/crypto/SecretSharing.d.ts +0 -24
- package/lib/crypto/SecretSharing.d.ts.map +0 -1
- package/lib/crypto/SecretSharing.js +0 -194
- package/lib/crypto/SecretSharing.js.map +0 -1
- package/lib/crypto/SecretStorage.d.ts +0 -55
- package/lib/crypto/SecretStorage.d.ts.map +0 -1
- package/lib/crypto/SecretStorage.js +0 -118
- package/lib/crypto/SecretStorage.js.map +0 -1
- package/lib/crypto/aes.d.ts +0 -6
- package/lib/crypto/aes.d.ts.map +0 -1
- package/lib/crypto/aes.js +0 -24
- package/lib/crypto/aes.js.map +0 -1
- package/lib/crypto/algorithms/base.d.ts +0 -156
- package/lib/crypto/algorithms/base.d.ts.map +0 -1
- package/lib/crypto/algorithms/base.js +0 -187
- package/lib/crypto/algorithms/base.js.map +0 -1
- package/lib/crypto/algorithms/index.d.ts +0 -4
- package/lib/crypto/algorithms/index.d.ts.map +0 -1
- package/lib/crypto/algorithms/index.js +0 -20
- package/lib/crypto/algorithms/index.js.map +0 -1
- package/lib/crypto/algorithms/megolm.d.ts +0 -385
- package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
- package/lib/crypto/algorithms/megolm.js +0 -1822
- package/lib/crypto/algorithms/megolm.js.map +0 -1
- package/lib/crypto/algorithms/olm.d.ts +0 -5
- package/lib/crypto/algorithms/olm.d.ts.map +0 -1
- package/lib/crypto/algorithms/olm.js +0 -299
- package/lib/crypto/algorithms/olm.js.map +0 -1
- package/lib/crypto/api.d.ts +0 -32
- package/lib/crypto/api.d.ts.map +0 -1
- package/lib/crypto/api.js +0 -22
- package/lib/crypto/api.js.map +0 -1
- package/lib/crypto/backup.d.ts +0 -227
- package/lib/crypto/backup.d.ts.map +0 -1
- package/lib/crypto/backup.js +0 -824
- package/lib/crypto/backup.js.map +0 -1
- package/lib/crypto/crypto.d.ts +0 -3
- package/lib/crypto/crypto.d.ts.map +0 -1
- package/lib/crypto/crypto.js +0 -19
- package/lib/crypto/crypto.js.map +0 -1
- package/lib/crypto/dehydration.d.ts +0 -34
- package/lib/crypto/dehydration.d.ts.map +0 -1
- package/lib/crypto/dehydration.js +0 -252
- package/lib/crypto/dehydration.js.map +0 -1
- package/lib/crypto/device-converter.d.ts +0 -9
- package/lib/crypto/device-converter.d.ts.map +0 -1
- package/lib/crypto/device-converter.js +0 -42
- package/lib/crypto/device-converter.js.map +0 -1
- package/lib/crypto/deviceinfo.d.ts +0 -99
- package/lib/crypto/deviceinfo.d.ts.map +0 -1
- package/lib/crypto/deviceinfo.js +0 -148
- package/lib/crypto/deviceinfo.js.map +0 -1
- package/lib/crypto/index.d.ts +0 -1210
- package/lib/crypto/index.d.ts.map +0 -1
- package/lib/crypto/index.js +0 -4101
- package/lib/crypto/index.js.map +0 -1
- package/lib/crypto/key_passphrase.d.ts +0 -14
- package/lib/crypto/key_passphrase.d.ts.map +0 -1
- package/lib/crypto/key_passphrase.js +0 -44
- package/lib/crypto/key_passphrase.js.map +0 -1
- package/lib/crypto/keybackup.d.ts +0 -18
- package/lib/crypto/keybackup.d.ts.map +0 -1
- package/lib/crypto/keybackup.js +0 -1
- package/lib/crypto/keybackup.js.map +0 -1
- package/lib/crypto/olmlib.d.ts +0 -129
- package/lib/crypto/olmlib.d.ts.map +0 -1
- package/lib/crypto/olmlib.js +0 -492
- package/lib/crypto/olmlib.js.map +0 -1
- package/lib/crypto/recoverykey.d.ts +0 -2
- package/lib/crypto/recoverykey.d.ts.map +0 -1
- package/lib/crypto/recoverykey.js +0 -19
- package/lib/crypto/recoverykey.js.map +0 -1
- package/lib/crypto/store/base.d.ts +0 -252
- package/lib/crypto/store/base.d.ts.map +0 -1
- package/lib/crypto/store/base.js +0 -64
- package/lib/crypto/store/base.js.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
- package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
- package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
- package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
- package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
- package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
- package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/localStorage-crypto-store.js +0 -531
- package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
- package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
- package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/memory-crypto-store.js +0 -622
- package/lib/crypto/store/memory-crypto-store.js.map +0 -1
- package/lib/crypto/verification/Base.d.ts +0 -105
- package/lib/crypto/verification/Base.d.ts.map +0 -1
- package/lib/crypto/verification/Base.js +0 -372
- package/lib/crypto/verification/Base.js.map +0 -1
- package/lib/crypto/verification/Error.d.ts +0 -35
- package/lib/crypto/verification/Error.d.ts.map +0 -1
- package/lib/crypto/verification/Error.js +0 -86
- package/lib/crypto/verification/Error.js.map +0 -1
- package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
- package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
- package/lib/crypto/verification/IllegalMethod.js +0 -43
- package/lib/crypto/verification/IllegalMethod.js.map +0 -1
- package/lib/crypto/verification/QRCode.d.ts +0 -51
- package/lib/crypto/verification/QRCode.d.ts.map +0 -1
- package/lib/crypto/verification/QRCode.js +0 -277
- package/lib/crypto/verification/QRCode.js.map +0 -1
- package/lib/crypto/verification/SAS.d.ts +0 -27
- package/lib/crypto/verification/SAS.d.ts.map +0 -1
- package/lib/crypto/verification/SAS.js +0 -485
- package/lib/crypto/verification/SAS.js.map +0 -1
- package/lib/crypto/verification/SASDecimal.d.ts +0 -8
- package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
- package/lib/crypto/verification/SASDecimal.js +0 -34
- package/lib/crypto/verification/SASDecimal.js.map +0 -1
- package/lib/crypto/verification/request/Channel.d.ts +0 -18
- package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
- package/lib/crypto/verification/request/Channel.js +0 -1
- package/lib/crypto/verification/request/Channel.js.map +0 -1
- package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
- package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
- package/lib/crypto/verification/request/InRoomChannel.js +0 -351
- package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
- package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
- package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
- package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
- package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
- package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
- package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
- package/lib/crypto/verification/request/VerificationRequest.js +0 -937
- package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
- package/lib/crypto-api/CryptoEvent.d.ts +0 -69
- package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
- package/lib/crypto-api/CryptoEvent.js +0 -33
- package/lib/crypto-api/CryptoEvent.js.map +0 -1
- package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
- package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
- package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
- package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
- package/lib/crypto-api/index.d.ts +0 -978
- package/lib/crypto-api/index.d.ts.map +0 -1
- package/lib/crypto-api/index.js +0 -304
- package/lib/crypto-api/index.js.map +0 -1
- package/lib/crypto-api/key-passphrase.d.ts +0 -11
- package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
- package/lib/crypto-api/key-passphrase.js +0 -51
- package/lib/crypto-api/key-passphrase.js.map +0 -1
- package/lib/crypto-api/keybackup.d.ts +0 -88
- package/lib/crypto-api/keybackup.d.ts.map +0 -1
- package/lib/crypto-api/keybackup.js +0 -1
- package/lib/crypto-api/keybackup.js.map +0 -1
- package/lib/crypto-api/recovery-key.d.ts +0 -11
- package/lib/crypto-api/recovery-key.d.ts.map +0 -1
- package/lib/crypto-api/recovery-key.js +0 -65
- package/lib/crypto-api/recovery-key.js.map +0 -1
- package/lib/crypto-api/verification.d.ts +0 -344
- package/lib/crypto-api/verification.d.ts.map +0 -1
- package/lib/crypto-api/verification.js +0 -91
- package/lib/crypto-api/verification.js.map +0 -1
- package/lib/matrixrtc/CallMembership.d.ts +0 -66
- package/lib/matrixrtc/CallMembership.d.ts.map +0 -1
- package/lib/matrixrtc/CallMembership.js +0 -197
- package/lib/matrixrtc/CallMembership.js.map +0 -1
- package/lib/matrixrtc/LivekitFocus.d.ts +0 -16
- package/lib/matrixrtc/LivekitFocus.d.ts.map +0 -1
- package/lib/matrixrtc/LivekitFocus.js +0 -20
- package/lib/matrixrtc/LivekitFocus.js.map +0 -1
- package/lib/matrixrtc/MatrixRTCSession.d.ts +0 -295
- package/lib/matrixrtc/MatrixRTCSession.d.ts.map +0 -1
- package/lib/matrixrtc/MatrixRTCSession.js +0 -1043
- package/lib/matrixrtc/MatrixRTCSession.js.map +0 -1
- package/lib/matrixrtc/MatrixRTCSessionManager.d.ts +0 -40
- package/lib/matrixrtc/MatrixRTCSessionManager.d.ts.map +0 -1
- package/lib/matrixrtc/MatrixRTCSessionManager.js +0 -146
- package/lib/matrixrtc/MatrixRTCSessionManager.js.map +0 -1
- package/lib/matrixrtc/focus.d.ts +0 -10
- package/lib/matrixrtc/focus.d.ts.map +0 -1
- package/lib/matrixrtc/focus.js +0 -1
- package/lib/matrixrtc/focus.js.map +0 -1
- package/lib/matrixrtc/index.d.ts +0 -7
- package/lib/matrixrtc/index.d.ts.map +0 -1
- package/lib/matrixrtc/index.js +0 -21
- package/lib/matrixrtc/index.js.map +0 -1
- package/lib/matrixrtc/types.d.ts +0 -19
- package/lib/matrixrtc/types.d.ts.map +0 -1
- package/lib/matrixrtc/types.js +0 -1
- package/lib/matrixrtc/types.js.map +0 -1
- package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
- package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
- package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
- package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
- package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
- package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousChannel.js +0 -1
- package/lib/rendezvous/RendezvousChannel.js.map +0 -1
- package/lib/rendezvous/RendezvousCode.d.ts +0 -9
- package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousCode.js +0 -1
- package/lib/rendezvous/RendezvousCode.js.map +0 -1
- package/lib/rendezvous/RendezvousError.d.ts +0 -6
- package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousError.js +0 -23
- package/lib/rendezvous/RendezvousError.js.map +0 -1
- package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
- package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousFailureReason.js +0 -38
- package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
- package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
- package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousIntent.js +0 -22
- package/lib/rendezvous/RendezvousIntent.js.map +0 -1
- package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
- package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousTransport.js +0 -1
- package/lib/rendezvous/RendezvousTransport.js.map +0 -1
- package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
- package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
- package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
- package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
- package/lib/rendezvous/channels/index.d.ts +0 -2
- package/lib/rendezvous/channels/index.d.ts.map +0 -1
- package/lib/rendezvous/channels/index.js +0 -18
- package/lib/rendezvous/channels/index.js.map +0 -1
- package/lib/rendezvous/index.d.ts +0 -10
- package/lib/rendezvous/index.d.ts.map +0 -1
- package/lib/rendezvous/index.js +0 -23
- package/lib/rendezvous/index.js.map +0 -1
- package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
- package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
- package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
- package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
- package/lib/rendezvous/transports/index.d.ts +0 -2
- package/lib/rendezvous/transports/index.d.ts.map +0 -1
- package/lib/rendezvous/transports/index.js +0 -18
- package/lib/rendezvous/transports/index.js.map +0 -1
- package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
- package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
- package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
- package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
- package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
- package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
- package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
- package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
- package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
- package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
- package/lib/rust-crypto/KeyClaimManager.js +0 -82
- package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
- package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
- package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
- package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
- package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
- package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
- package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
- package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
- package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
- package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
- package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
- package/lib/rust-crypto/RoomEncryptor.js +0 -299
- package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
- package/lib/rust-crypto/backup.d.ts +0 -254
- package/lib/rust-crypto/backup.d.ts.map +0 -1
- package/lib/rust-crypto/backup.js +0 -837
- package/lib/rust-crypto/backup.js.map +0 -1
- package/lib/rust-crypto/constants.d.ts +0 -3
- package/lib/rust-crypto/constants.d.ts.map +0 -1
- package/lib/rust-crypto/constants.js +0 -19
- package/lib/rust-crypto/constants.js.map +0 -1
- package/lib/rust-crypto/device-converter.d.ts +0 -28
- package/lib/rust-crypto/device-converter.d.ts.map +0 -1
- package/lib/rust-crypto/device-converter.js +0 -123
- package/lib/rust-crypto/device-converter.js.map +0 -1
- package/lib/rust-crypto/index.d.ts +0 -61
- package/lib/rust-crypto/index.d.ts.map +0 -1
- package/lib/rust-crypto/index.js +0 -152
- package/lib/rust-crypto/index.js.map +0 -1
- package/lib/rust-crypto/libolm_migration.d.ts +0 -81
- package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
- package/lib/rust-crypto/libolm_migration.js +0 -459
- package/lib/rust-crypto/libolm_migration.js.map +0 -1
- package/lib/rust-crypto/rust-crypto.d.ts +0 -556
- package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
- package/lib/rust-crypto/rust-crypto.js +0 -2016
- package/lib/rust-crypto/rust-crypto.js.map +0 -1
- package/lib/rust-crypto/secret-storage.d.ts +0 -22
- package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
- package/lib/rust-crypto/secret-storage.js +0 -63
- package/lib/rust-crypto/secret-storage.js.map +0 -1
- package/lib/rust-crypto/verification.d.ts +0 -319
- package/lib/rust-crypto/verification.d.ts.map +0 -1
- package/lib/rust-crypto/verification.js +0 -816
- package/lib/rust-crypto/verification.js.map +0 -1
- package/lib/secret-storage.d.ts +0 -370
- package/lib/secret-storage.d.ts.map +0 -1
- package/lib/secret-storage.js +0 -466
- package/lib/secret-storage.js.map +0 -1
- package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
- package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
- package/lib/utils/decryptAESSecretStorageItem.js +0 -50
- package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
- package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
- package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
- package/lib/utils/encryptAESSecretStorageItem.js +0 -68
- package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
- package/lib/utils/internal/deriveKeys.d.ts +0 -10
- package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
- package/lib/utils/internal/deriveKeys.js +0 -60
- package/lib/utils/internal/deriveKeys.js.map +0 -1
- package/lib/webrtc/audioContext.d.ts +0 -15
- package/lib/webrtc/audioContext.d.ts.map +0 -1
- package/lib/webrtc/audioContext.js +0 -46
- package/lib/webrtc/audioContext.js.map +0 -1
- package/lib/webrtc/call.d.ts +0 -560
- package/lib/webrtc/call.d.ts.map +0 -1
- package/lib/webrtc/call.js +0 -2541
- package/lib/webrtc/call.js.map +0 -1
- package/lib/webrtc/callEventHandler.d.ts +0 -37
- package/lib/webrtc/callEventHandler.d.ts.map +0 -1
- package/lib/webrtc/callEventHandler.js +0 -344
- package/lib/webrtc/callEventHandler.js.map +0 -1
- package/lib/webrtc/callEventTypes.d.ts +0 -73
- package/lib/webrtc/callEventTypes.d.ts.map +0 -1
- package/lib/webrtc/callEventTypes.js +0 -13
- package/lib/webrtc/callEventTypes.js.map +0 -1
- package/lib/webrtc/callFeed.d.ts +0 -128
- package/lib/webrtc/callFeed.d.ts.map +0 -1
- package/lib/webrtc/callFeed.js +0 -289
- package/lib/webrtc/callFeed.js.map +0 -1
- package/lib/webrtc/groupCall.d.ts +0 -323
- package/lib/webrtc/groupCall.d.ts.map +0 -1
- package/lib/webrtc/groupCall.js +0 -1337
- package/lib/webrtc/groupCall.js.map +0 -1
- package/lib/webrtc/groupCallEventHandler.d.ts +0 -31
- package/lib/webrtc/groupCallEventHandler.d.ts.map +0 -1
- package/lib/webrtc/groupCallEventHandler.js +0 -178
- package/lib/webrtc/groupCallEventHandler.js.map +0 -1
- package/lib/webrtc/mediaHandler.d.ts +0 -89
- package/lib/webrtc/mediaHandler.d.ts.map +0 -1
- package/lib/webrtc/mediaHandler.js +0 -437
- package/lib/webrtc/mediaHandler.js.map +0 -1
- package/lib/webrtc/stats/callFeedStatsReporter.d.ts +0 -8
- package/lib/webrtc/stats/callFeedStatsReporter.d.ts.map +0 -1
- package/lib/webrtc/stats/callFeedStatsReporter.js +0 -82
- package/lib/webrtc/stats/callFeedStatsReporter.js.map +0 -1
- package/lib/webrtc/stats/callStatsReportGatherer.d.ts +0 -25
- package/lib/webrtc/stats/callStatsReportGatherer.d.ts.map +0 -1
- package/lib/webrtc/stats/callStatsReportGatherer.js +0 -199
- package/lib/webrtc/stats/callStatsReportGatherer.js.map +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.d.ts +0 -17
- package/lib/webrtc/stats/callStatsReportSummary.d.ts.map +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.js +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.js.map +0 -1
- package/lib/webrtc/stats/connectionStats.d.ts +0 -28
- package/lib/webrtc/stats/connectionStats.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStats.js +0 -26
- package/lib/webrtc/stats/connectionStats.js.map +0 -1
- package/lib/webrtc/stats/connectionStatsBuilder.d.ts +0 -5
- package/lib/webrtc/stats/connectionStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStatsBuilder.js +0 -27
- package/lib/webrtc/stats/connectionStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts +0 -7
- package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStatsReportBuilder.js +0 -121
- package/lib/webrtc/stats/connectionStatsReportBuilder.js.map +0 -1
- package/lib/webrtc/stats/groupCallStats.d.ts +0 -22
- package/lib/webrtc/stats/groupCallStats.d.ts.map +0 -1
- package/lib/webrtc/stats/groupCallStats.js +0 -78
- package/lib/webrtc/stats/groupCallStats.js.map +0 -1
- package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts +0 -10
- package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaSsrcHandler.js +0 -57
- package/lib/webrtc/stats/media/mediaSsrcHandler.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackHandler.d.ts +0 -12
- package/lib/webrtc/stats/media/mediaTrackHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackHandler.js +0 -62
- package/lib/webrtc/stats/media/mediaTrackHandler.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStats.d.ts +0 -86
- package/lib/webrtc/stats/media/mediaTrackStats.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStats.js +0 -142
- package/lib/webrtc/stats/media/mediaTrackStats.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts +0 -22
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.js +0 -76
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.js.map +0 -1
- package/lib/webrtc/stats/statsReport.d.ts +0 -99
- package/lib/webrtc/stats/statsReport.d.ts.map +0 -1
- package/lib/webrtc/stats/statsReport.js +0 -32
- package/lib/webrtc/stats/statsReport.js.map +0 -1
- package/lib/webrtc/stats/statsReportEmitter.d.ts +0 -15
- package/lib/webrtc/stats/statsReportEmitter.d.ts.map +0 -1
- package/lib/webrtc/stats/statsReportEmitter.js +0 -33
- package/lib/webrtc/stats/statsReportEmitter.js.map +0 -1
- package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts +0 -16
- package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts.map +0 -1
- package/lib/webrtc/stats/summaryStatsReportGatherer.js +0 -116
- package/lib/webrtc/stats/summaryStatsReportGatherer.js.map +0 -1
- package/lib/webrtc/stats/trackStatsBuilder.d.ts +0 -19
- package/lib/webrtc/stats/trackStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/trackStatsBuilder.js +0 -168
- package/lib/webrtc/stats/trackStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/transportStats.d.ts +0 -11
- package/lib/webrtc/stats/transportStats.d.ts.map +0 -1
- package/lib/webrtc/stats/transportStats.js +0 -1
- package/lib/webrtc/stats/transportStats.js.map +0 -1
- package/lib/webrtc/stats/transportStatsBuilder.d.ts +0 -5
- package/lib/webrtc/stats/transportStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/transportStatsBuilder.js +0 -34
- package/lib/webrtc/stats/transportStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/valueFormatter.d.ts +0 -4
- package/lib/webrtc/stats/valueFormatter.d.ts.map +0 -1
- package/lib/webrtc/stats/valueFormatter.js +0 -25
- package/lib/webrtc/stats/valueFormatter.js.map +0 -1
- package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
- package/src/@types/crypto.ts +0 -73
- package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
- package/src/common-crypto/CryptoBackend.ts +0 -302
- package/src/common-crypto/README.md +0 -4
- package/src/common-crypto/key-passphrase.ts +0 -43
- package/src/crypto/CrossSigning.ts +0 -773
- package/src/crypto/DeviceList.ts +0 -989
- package/src/crypto/EncryptionSetup.ts +0 -351
- package/src/crypto/OlmDevice.ts +0 -1500
- package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
- package/src/crypto/RoomList.ts +0 -70
- package/src/crypto/SecretSharing.ts +0 -240
- package/src/crypto/SecretStorage.ts +0 -136
- package/src/crypto/aes.ts +0 -23
- package/src/crypto/algorithms/base.ts +0 -236
- package/src/crypto/algorithms/index.ts +0 -20
- package/src/crypto/algorithms/megolm.ts +0 -2216
- package/src/crypto/algorithms/olm.ts +0 -381
- package/src/crypto/api.ts +0 -70
- package/src/crypto/backup.ts +0 -922
- package/src/crypto/crypto.ts +0 -18
- package/src/crypto/dehydration.ts +0 -272
- package/src/crypto/device-converter.ts +0 -45
- package/src/crypto/deviceinfo.ts +0 -158
- package/src/crypto/index.ts +0 -4418
- package/src/crypto/key_passphrase.ts +0 -42
- package/src/crypto/keybackup.ts +0 -47
- package/src/crypto/olmlib.ts +0 -539
- package/src/crypto/recoverykey.ts +0 -18
- package/src/crypto/store/base.ts +0 -348
- package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
- package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
- package/src/crypto/store/localStorage-crypto-store.ts +0 -579
- package/src/crypto/store/memory-crypto-store.ts +0 -680
- package/src/crypto/verification/Base.ts +0 -409
- package/src/crypto/verification/Error.ts +0 -76
- package/src/crypto/verification/IllegalMethod.ts +0 -50
- package/src/crypto/verification/QRCode.ts +0 -310
- package/src/crypto/verification/SAS.ts +0 -494
- package/src/crypto/verification/SASDecimal.ts +0 -37
- package/src/crypto/verification/request/Channel.ts +0 -34
- package/src/crypto/verification/request/InRoomChannel.ts +0 -371
- package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
- package/src/crypto/verification/request/VerificationRequest.ts +0 -976
- package/src/crypto-api/CryptoEvent.ts +0 -93
- package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
- package/src/crypto-api/index.ts +0 -1175
- package/src/crypto-api/key-passphrase.ts +0 -58
- package/src/crypto-api/keybackup.ts +0 -115
- package/src/crypto-api/recovery-key.ts +0 -69
- package/src/crypto-api/verification.ts +0 -408
- package/src/matrixrtc/CallMembership.ts +0 -247
- package/src/matrixrtc/LivekitFocus.ts +0 -39
- package/src/matrixrtc/MatrixRTCSession.ts +0 -1319
- package/src/matrixrtc/MatrixRTCSessionManager.ts +0 -166
- package/src/matrixrtc/focus.ts +0 -25
- package/src/matrixrtc/index.ts +0 -22
- package/src/matrixrtc/types.ts +0 -36
- package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
- package/src/rendezvous/RendezvousChannel.ts +0 -48
- package/src/rendezvous/RendezvousCode.ts +0 -25
- package/src/rendezvous/RendezvousError.ts +0 -26
- package/src/rendezvous/RendezvousFailureReason.ts +0 -49
- package/src/rendezvous/RendezvousIntent.ts +0 -20
- package/src/rendezvous/RendezvousTransport.ts +0 -58
- package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
- package/src/rendezvous/channels/index.ts +0 -17
- package/src/rendezvous/index.ts +0 -25
- package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
- package/src/rendezvous/transports/index.ts +0 -17
- package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
- package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
- package/src/rust-crypto/KeyClaimManager.ts +0 -86
- package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
- package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
- package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
- package/src/rust-crypto/RoomEncryptor.ts +0 -352
- package/src/rust-crypto/backup.ts +0 -881
- package/src/rust-crypto/constants.ts +0 -18
- package/src/rust-crypto/device-converter.ts +0 -128
- package/src/rust-crypto/index.ts +0 -237
- package/src/rust-crypto/libolm_migration.ts +0 -530
- package/src/rust-crypto/rust-crypto.ts +0 -2205
- package/src/rust-crypto/secret-storage.ts +0 -60
- package/src/rust-crypto/verification.ts +0 -830
- package/src/secret-storage.ts +0 -693
- package/src/utils/decryptAESSecretStorageItem.ts +0 -54
- package/src/utils/encryptAESSecretStorageItem.ts +0 -73
- package/src/utils/internal/deriveKeys.ts +0 -63
- package/src/webrtc/audioContext.ts +0 -44
- package/src/webrtc/call.ts +0 -3074
- package/src/webrtc/callEventHandler.ts +0 -425
- package/src/webrtc/callEventTypes.ts +0 -93
- package/src/webrtc/callFeed.ts +0 -364
- package/src/webrtc/groupCall.ts +0 -1735
- package/src/webrtc/groupCallEventHandler.ts +0 -234
- package/src/webrtc/mediaHandler.ts +0 -484
- package/src/webrtc/stats/callFeedStatsReporter.ts +0 -94
- package/src/webrtc/stats/callStatsReportGatherer.ts +0 -219
- package/src/webrtc/stats/callStatsReportSummary.ts +0 -30
- package/src/webrtc/stats/connectionStats.ts +0 -47
- package/src/webrtc/stats/connectionStatsBuilder.ts +0 -28
- package/src/webrtc/stats/connectionStatsReportBuilder.ts +0 -140
- package/src/webrtc/stats/groupCallStats.ts +0 -93
- package/src/webrtc/stats/media/mediaSsrcHandler.ts +0 -57
- package/src/webrtc/stats/media/mediaTrackHandler.ts +0 -76
- package/src/webrtc/stats/media/mediaTrackStats.ts +0 -176
- package/src/webrtc/stats/media/mediaTrackStatsHandler.ts +0 -90
- package/src/webrtc/stats/statsReport.ts +0 -133
- package/src/webrtc/stats/statsReportEmitter.ts +0 -49
- package/src/webrtc/stats/summaryStatsReportGatherer.ts +0 -148
- package/src/webrtc/stats/trackStatsBuilder.ts +0 -207
- package/src/webrtc/stats/transportStats.ts +0 -26
- package/src/webrtc/stats/transportStatsBuilder.ts +0 -48
- package/src/webrtc/stats/valueFormatter.ts +0 -27
package/src/client.ts
CHANGED
@@ -20,7 +20,6 @@ limitations under the License.
|
|
20
20
|
|
21
21
|
import { Optional } from "matrix-events-sdk";
|
22
22
|
|
23
|
-
import type { IDeviceKeys, IMegolmSessionData, IOneTimeKey } from "./@types/crypto.ts";
|
24
23
|
import { ISyncStateData, SetPresence, SyncApi, SyncApiOptions, SyncState } from "./sync.ts";
|
25
24
|
import {
|
26
25
|
EventStatus,
|
@@ -33,25 +32,14 @@ import {
|
|
33
32
|
PushDetails,
|
34
33
|
} from "./models/event.ts";
|
35
34
|
import { StubStore } from "./store/stub.ts";
|
36
|
-
import { CallEvent, CallEventHandlerMap, createNewMatrixCall, MatrixCall, supportsMatrixCall } from "./webrtc/call.ts";
|
37
35
|
import { Filter, IFilterDefinition, IRoomEventFilter } from "./filter.ts";
|
38
|
-
import { CallEventHandler, CallEventHandlerEvent, CallEventHandlerEventHandlerMap } from "./webrtc/callEventHandler.ts";
|
39
|
-
import {
|
40
|
-
GroupCallEventHandler,
|
41
|
-
GroupCallEventHandlerEvent,
|
42
|
-
GroupCallEventHandlerEventHandlerMap,
|
43
|
-
} from "./webrtc/groupCallEventHandler.ts";
|
44
36
|
import * as utils from "./utils.ts";
|
45
|
-
import { noUnsafeEventProps, QueryDict, replaceParam,
|
37
|
+
import { noUnsafeEventProps, QueryDict, replaceParam, sleep } from "./utils.ts";
|
46
38
|
import { Direction, EventTimeline } from "./models/event-timeline.ts";
|
47
39
|
import { IActionsObject, PushProcessor } from "./pushprocessor.ts";
|
48
40
|
import { AutoDiscovery, AutoDiscoveryAction } from "./autodiscovery.ts";
|
49
|
-
import
|
50
|
-
import { decodeBase64, encodeBase64, encodeUnpaddedBase64Url } from "./base64.ts";
|
51
|
-
import { IExportedDevice as IExportedOlmDevice } from "./crypto/OlmDevice.ts";
|
52
|
-
import { IOlmDevice } from "./crypto/algorithms/megolm.ts";
|
41
|
+
import { encodeUnpaddedBase64Url } from "./base64.ts";
|
53
42
|
import { TypedReEmitter } from "./ReEmitter.ts";
|
54
|
-
import { IRoomEncryption } from "./crypto/RoomList.ts";
|
55
43
|
import { logger, Logger } from "./logger.ts";
|
56
44
|
import { SERVICE_TYPES } from "./service-types.ts";
|
57
45
|
import {
|
@@ -60,7 +48,6 @@ import {
|
|
60
48
|
FileType,
|
61
49
|
HttpApiEvent,
|
62
50
|
HttpApiEventHandlerMap,
|
63
|
-
HTTPError,
|
64
51
|
IdentityPrefix,
|
65
52
|
IHttpOpts,
|
66
53
|
IRequestOpts,
|
@@ -74,39 +61,16 @@ import {
|
|
74
61
|
UploadOpts,
|
75
62
|
UploadResponse,
|
76
63
|
} from "./http-api/index.ts";
|
77
|
-
import {
|
78
|
-
Crypto,
|
79
|
-
CryptoEvent as LegacyCryptoEvent,
|
80
|
-
CryptoEventHandlerMap as LegacyCryptoEventHandlerMap,
|
81
|
-
fixBackupKey,
|
82
|
-
ICheckOwnCrossSigningTrustOpts,
|
83
|
-
IRoomKeyRequestBody,
|
84
|
-
isCryptoAvailable,
|
85
|
-
} from "./crypto/index.ts";
|
86
|
-
import { DeviceInfo } from "./crypto/deviceinfo.ts";
|
87
64
|
import { User, UserEvent, UserEventHandlerMap } from "./models/user.ts";
|
88
65
|
import { getHttpUriForMxc } from "./content-repo.ts";
|
89
66
|
import { SearchResult } from "./models/search-result.ts";
|
90
|
-
import { DEHYDRATION_ALGORITHM, IDehydratedDevice, IDehydratedDeviceKeyInfo } from "./crypto/dehydration.ts";
|
91
|
-
import {
|
92
|
-
IKeyBackupInfo,
|
93
|
-
IKeyBackupPrepareOpts,
|
94
|
-
IKeyBackupRestoreOpts,
|
95
|
-
IKeyBackupRestoreResult,
|
96
|
-
IKeyBackupRoomSessions,
|
97
|
-
IKeyBackupSession,
|
98
|
-
} from "./crypto/keybackup.ts";
|
99
67
|
import { IIdentityServerProvider } from "./@types/IIdentityServerProvider.ts";
|
100
68
|
import { MatrixScheduler } from "./scheduler.ts";
|
101
69
|
import { BeaconEvent, BeaconEventHandlerMap } from "./models/beacon.ts";
|
102
70
|
import { AuthDict } from "./interactive-auth.ts";
|
103
71
|
import { IMinimalEvent, IRoomEvent, IStateEvent } from "./sync-accumulator.ts";
|
104
|
-
import { CrossSigningKey, ICreateSecretStorageOpts, IEncryptedEventInfo, IRecoveryKey } from "./crypto/api.ts";
|
105
72
|
import { EventTimelineSet } from "./models/event-timeline-set.ts";
|
106
|
-
import { VerificationRequest } from "./crypto/verification/request/VerificationRequest.ts";
|
107
|
-
import { VerificationBase as Verification } from "./crypto/verification/Base.ts";
|
108
73
|
import * as ContentHelpers from "./content-helpers.ts";
|
109
|
-
import { CrossSigningInfo, DeviceTrustLevel, ICacheCallbacks, UserTrustLevel } from "./crypto/CrossSigning.ts";
|
110
74
|
import { NotificationCountType, Room, RoomEvent, RoomEventHandlerMap, RoomNameState } from "./models/room.ts";
|
111
75
|
import { RoomMemberEvent, RoomMemberEventHandlerMap } from "./models/room-member.ts";
|
112
76
|
import { IPowerLevelsContent, RoomStateEvent, RoomStateEventHandlerMap } from "./models/room-state.ts";
|
@@ -137,6 +101,7 @@ import {
|
|
137
101
|
UpdateDelayedEventAction,
|
138
102
|
} from "./@types/requests.ts";
|
139
103
|
import {
|
104
|
+
AccountDataEvents,
|
140
105
|
EventType,
|
141
106
|
LOCAL_NOTIFICATION_SETTINGS_PREFIX,
|
142
107
|
MSC3912_RELATION_BASED_REDACTIONS_PROP,
|
@@ -160,12 +125,10 @@ import {
|
|
160
125
|
Visibility,
|
161
126
|
} from "./@types/partials.ts";
|
162
127
|
import { EventMapper, eventMapperFor, MapperOpts } from "./event-mapper.ts";
|
163
|
-
import {
|
164
|
-
import { BackupManager, IKeyBackup, IKeyBackupCheck, IPreparedKeyBackupVersion, TrustInfo } from "./crypto/backup.ts";
|
128
|
+
import { secureRandomString } from "./randomstring.ts";
|
165
129
|
import { DEFAULT_TREE_POWER_LEVELS_TEMPLATE, MSC3089TreeSpace } from "./models/MSC3089TreeSpace.ts";
|
166
130
|
import { ISignatures } from "./@types/signed.ts";
|
167
131
|
import { IStore } from "./store/index.ts";
|
168
|
-
import { ISecretRequest } from "./crypto/SecretStorage.ts";
|
169
132
|
import {
|
170
133
|
IEventWithRoomId,
|
171
134
|
ISearchRequestBody,
|
@@ -187,9 +150,6 @@ import {
|
|
187
150
|
RuleId,
|
188
151
|
} from "./@types/PushRules.ts";
|
189
152
|
import { IThreepid } from "./@types/threepids.ts";
|
190
|
-
import { CryptoStore, OutgoingRoomKeyRequest } from "./crypto/store/base.ts";
|
191
|
-
import { GroupCall, GroupCallIntent, GroupCallType, IGroupCallDataChannelOptions } from "./webrtc/groupCall.ts";
|
192
|
-
import { MediaHandler } from "./webrtc/mediaHandler.ts";
|
193
153
|
import {
|
194
154
|
ILoginFlowsResponse,
|
195
155
|
IRefreshTokenResponse,
|
@@ -218,42 +178,20 @@ import { IgnoredInvites } from "./models/invites-ignorer.ts";
|
|
218
178
|
import { UIARequest, UIAResponse } from "./@types/uia.ts";
|
219
179
|
import { LocalNotificationSettings } from "./@types/local_notifications.ts";
|
220
180
|
import { buildFeatureSupportMap, Feature, ServerSupport } from "./feature.ts";
|
221
|
-
import { BackupDecryptor, CryptoBackend } from "./common-crypto/CryptoBackend.ts";
|
222
|
-
import { RUST_SDK_STORE_PREFIX } from "./rust-crypto/constants.ts";
|
223
|
-
import {
|
224
|
-
BootstrapCrossSigningOpts,
|
225
|
-
CrossSigningKeyInfo,
|
226
|
-
CryptoApi,
|
227
|
-
decodeRecoveryKey,
|
228
|
-
ImportRoomKeysOpts,
|
229
|
-
CryptoEvent,
|
230
|
-
CryptoEventHandlerMap,
|
231
|
-
CryptoCallbacks,
|
232
|
-
} from "./crypto-api/index.ts";
|
233
|
-
import { DeviceInfoMap } from "./crypto/DeviceList.ts";
|
234
|
-
import {
|
235
|
-
AddSecretStorageKeyOpts,
|
236
|
-
SecretStorageKeyDescription,
|
237
|
-
ServerSideSecretStorage,
|
238
|
-
ServerSideSecretStorageImpl,
|
239
|
-
} from "./secret-storage.ts";
|
240
181
|
import { RegisterRequest, RegisterResponse } from "./@types/registration.ts";
|
241
|
-
import { MatrixRTCSessionManager } from "./matrixrtc/MatrixRTCSessionManager.ts";
|
242
182
|
import { getRelationsThreadFilter } from "./thread-utils.ts";
|
243
183
|
import { KnownMembership, Membership } from "./@types/membership.ts";
|
244
184
|
import { RoomMessageEventContent, StickerEventContent } from "./@types/events.ts";
|
245
185
|
import { ImageInfo } from "./@types/media.ts";
|
246
186
|
import { Capabilities, ServerCapabilities } from "./serverCapabilities.ts";
|
247
187
|
import { sha256 } from "./digest.ts";
|
248
|
-
import {
|
188
|
+
import { discoverAndValidateOIDCIssuerWellKnown, OidcClientConfig, validateAuthMetadataAndKeys } from "./oidc/index.ts";
|
249
189
|
|
250
190
|
export type Store = IStore;
|
251
191
|
|
252
192
|
export type ResetTimelineCallback = (roomId: string) => boolean;
|
253
193
|
|
254
194
|
const SCROLLBACK_DELAY_MS = 3000;
|
255
|
-
export const CRYPTO_ENABLED: boolean = isCryptoAvailable();
|
256
|
-
const TURN_CHECK_INTERVAL = 10 * 60 * 1000; // poll for turn credentials every 10 minutes
|
257
195
|
|
258
196
|
export const UNSTABLE_MSC3852_LAST_SEEN_UA = new UnstableValue(
|
259
197
|
"last_seen_user_agent",
|
@@ -261,18 +199,10 @@ export const UNSTABLE_MSC3852_LAST_SEEN_UA = new UnstableValue(
|
|
261
199
|
);
|
262
200
|
|
263
201
|
interface IExportedDevice {
|
264
|
-
olmDevice: IExportedOlmDevice;
|
265
202
|
userId: string;
|
266
203
|
deviceId: string;
|
267
204
|
}
|
268
205
|
|
269
|
-
export interface IKeysUploadResponse {
|
270
|
-
one_time_key_counts: {
|
271
|
-
// eslint-disable-line camelcase
|
272
|
-
[algorithm: string]: number;
|
273
|
-
};
|
274
|
-
}
|
275
|
-
|
276
206
|
export interface ICreateClientOpts {
|
277
207
|
baseUrl: string;
|
278
208
|
|
@@ -285,20 +215,6 @@ export interface ICreateClientOpts {
|
|
285
215
|
*/
|
286
216
|
store?: Store;
|
287
217
|
|
288
|
-
/**
|
289
|
-
* A store to be used for end-to-end crypto session data.
|
290
|
-
* The `createClient` helper will create a default store if needed. Calls the factory supplied to
|
291
|
-
* {@link setCryptoStoreFactory} if unspecified; or if no factory has been
|
292
|
-
* specified, uses a default implementation (indexeddb in the browser,
|
293
|
-
* in-memory otherwise).
|
294
|
-
*
|
295
|
-
* This is only used for the legacy crypto implementation (as used by {@link MatrixClient#initCrypto}),
|
296
|
-
* but if you use the rust crypto implementation ({@link MatrixClient#initRustCrypto}) and the device
|
297
|
-
* previously used legacy crypto (so must be migrated), then this must still be provided, so that the
|
298
|
-
* data can be migrated from the legacy store.
|
299
|
-
*/
|
300
|
-
cryptoStore?: CryptoStore;
|
301
|
-
|
302
218
|
/**
|
303
219
|
* The scheduler to use. If not
|
304
220
|
* specified, this client will not retry requests on failure. This client
|
@@ -382,18 +298,6 @@ export interface ICreateClientOpts {
|
|
382
298
|
*/
|
383
299
|
deviceToImport?: IExportedDevice;
|
384
300
|
|
385
|
-
/**
|
386
|
-
* Encryption key used for encrypting sensitive data (such as e2ee keys) in {@link ICreateClientOpts#cryptoStore}.
|
387
|
-
*
|
388
|
-
* This must be set to the same value every time the client is initialised for the same device.
|
389
|
-
*
|
390
|
-
* This is only used for the legacy crypto implementation (as used by {@link MatrixClient#initCrypto}),
|
391
|
-
* but if you use the rust crypto implementation ({@link MatrixClient#initRustCrypto}) and the device
|
392
|
-
* previously used legacy crypto (so must be migrated), then this must still be provided, so that the
|
393
|
-
* data can be migrated from the legacy store.
|
394
|
-
*/
|
395
|
-
pickleKey?: string;
|
396
|
-
|
397
301
|
/**
|
398
302
|
* Verification methods we should offer to the other side when performing an interactive verification.
|
399
303
|
* If unset, we will offer all known methods. Currently these are: showing a QR code, scanning a QR code, and SAS
|
@@ -403,11 +307,6 @@ export interface ICreateClientOpts {
|
|
403
307
|
*/
|
404
308
|
verificationMethods?: Array<string>;
|
405
309
|
|
406
|
-
/**
|
407
|
-
* Whether relaying calls through a TURN server should be forced. Default false.
|
408
|
-
*/
|
409
|
-
forceTURN?: boolean;
|
410
|
-
|
411
310
|
/**
|
412
311
|
* Up to this many ICE candidates will be gathered when an incoming call arrives.
|
413
312
|
* Gathering does not send data to the caller, but will communicate with the configured TURN
|
@@ -415,30 +314,14 @@ export interface ICreateClientOpts {
|
|
415
314
|
*/
|
416
315
|
iceCandidatePoolSize?: number;
|
417
316
|
|
418
|
-
/**
|
419
|
-
* True to advertise support for call transfers to other parties on Matrix calls. Default false.
|
420
|
-
*/
|
421
|
-
supportsCallTransfer?: boolean;
|
422
|
-
|
423
317
|
/**
|
424
318
|
* Whether to allow a fallback ICE server should be used for negotiating a
|
425
319
|
* WebRTC connection if the homeserver doesn't provide any servers. Defaults to false.
|
426
320
|
*/
|
427
321
|
fallbackICEServerAllowed?: boolean;
|
428
322
|
|
429
|
-
/**
|
430
|
-
* If true, to-device signalling for group calls will be encrypted
|
431
|
-
* with Olm. Default: true.
|
432
|
-
*/
|
433
|
-
useE2eForGroupCall?: boolean;
|
434
|
-
|
435
323
|
livekitServiceURL?: string;
|
436
324
|
|
437
|
-
/**
|
438
|
-
* Crypto callbacks provided by the application
|
439
|
-
*/
|
440
|
-
cryptoCallbacks?: CryptoCallbacks;
|
441
|
-
|
442
325
|
/**
|
443
326
|
* Method to generate room names for empty rooms and rooms names based on membership.
|
444
327
|
* Defaults to a built-in English handler with basic pluralisation.
|
@@ -542,7 +425,7 @@ export interface IStartClientOpts {
|
|
542
425
|
slidingSync?: SlidingSync;
|
543
426
|
}
|
544
427
|
|
545
|
-
export interface IStoredClientOpts extends IStartClientOpts {}
|
428
|
+
export interface IStoredClientOpts extends IStartClientOpts { }
|
546
429
|
|
547
430
|
export const GET_LOGIN_TOKEN_CAPABILITY = new NamespacedValue(
|
548
431
|
"m.get_login_token",
|
@@ -557,25 +440,8 @@ export const UNSTABLE_MSC4140_DELAYED_EVENTS = "org.matrix.msc4140";
|
|
557
440
|
|
558
441
|
export const UNSTABLE_MSC4133_EXTENDED_PROFILES = "uk.tcpip.msc4133";
|
559
442
|
|
560
|
-
enum CrossSigningKeyType {
|
561
|
-
MasterKey = "master_key",
|
562
|
-
SelfSigningKey = "self_signing_key",
|
563
|
-
UserSigningKey = "user_signing_key",
|
564
|
-
}
|
565
|
-
|
566
|
-
export type CrossSigningKeys = Record<CrossSigningKeyType, CrossSigningKeyInfo>;
|
567
|
-
|
568
443
|
export type SendToDeviceContentMap = Map<string, Map<string, Record<string, any>>>;
|
569
444
|
|
570
|
-
export interface ISignedKey {
|
571
|
-
keys: Record<string, string>;
|
572
|
-
signatures: ISignatures;
|
573
|
-
user_id: string;
|
574
|
-
algorithms: string[];
|
575
|
-
device_id: string;
|
576
|
-
}
|
577
|
-
|
578
|
-
export type KeySignatures = Record<string, Record<string, CrossSigningKeyInfo | ISignedKey>>;
|
579
445
|
export interface IUploadKeySignaturesResponse {
|
580
446
|
failures: Record<
|
581
447
|
string,
|
@@ -637,13 +503,6 @@ export interface IWellKnownConfig<T = IClientWellKnown> {
|
|
637
503
|
server_name?: string;
|
638
504
|
}
|
639
505
|
|
640
|
-
interface IKeyBackupPath {
|
641
|
-
path: string;
|
642
|
-
queryData?: {
|
643
|
-
version: string;
|
644
|
-
};
|
645
|
-
}
|
646
|
-
|
647
506
|
interface IMediaConfig {
|
648
507
|
[key: string]: any; // extensible
|
649
508
|
"m.upload.size"?: number;
|
@@ -690,12 +549,6 @@ export interface IRequestMsisdnTokenResponse extends IRequestTokenResponse {
|
|
690
549
|
intl_fmt: string;
|
691
550
|
}
|
692
551
|
|
693
|
-
export interface IUploadKeysRequest {
|
694
|
-
"device_keys"?: Required<IDeviceKeys>;
|
695
|
-
"one_time_keys"?: Record<string, IOneTimeKey>;
|
696
|
-
"org.matrix.msc2732.fallback_keys"?: Record<string, IOneTimeKey>;
|
697
|
-
}
|
698
|
-
|
699
552
|
export interface IQueryKeysRequest {
|
700
553
|
device_keys: { [userId: string]: string[] };
|
701
554
|
timeout?: number;
|
@@ -790,27 +643,6 @@ export interface Keys {
|
|
790
643
|
user_id: string;
|
791
644
|
}
|
792
645
|
|
793
|
-
export interface SigningKeys extends Keys {
|
794
|
-
signatures: ISignatures;
|
795
|
-
}
|
796
|
-
|
797
|
-
export interface DeviceKeys {
|
798
|
-
[deviceId: string]: IDeviceKeys & {
|
799
|
-
unsigned?: {
|
800
|
-
device_display_name: string;
|
801
|
-
};
|
802
|
-
};
|
803
|
-
}
|
804
|
-
|
805
|
-
export interface IDownloadKeyResult {
|
806
|
-
failures: { [serverName: string]: object };
|
807
|
-
device_keys: { [userId: string]: DeviceKeys };
|
808
|
-
// the following three fields were added in 1.1
|
809
|
-
master_keys?: { [userId: string]: Keys };
|
810
|
-
self_signing_keys?: { [userId: string]: SigningKeys };
|
811
|
-
user_signing_keys?: { [userId: string]: SigningKeys };
|
812
|
-
}
|
813
|
-
|
814
646
|
export interface IClaimOTKsResult {
|
815
647
|
failures: { [serverName: string]: object };
|
816
648
|
one_time_keys: {
|
@@ -879,14 +711,6 @@ export interface RoomSummary extends Omit<IPublicRoomsChunkRoom, "canonical_alia
|
|
879
711
|
"im.nheko.summary.encryption"?: string;
|
880
712
|
}
|
881
713
|
|
882
|
-
interface IRoomKeysResponse {
|
883
|
-
sessions: IKeyBackupRoomSessions;
|
884
|
-
}
|
885
|
-
|
886
|
-
interface IRoomsKeysResponse {
|
887
|
-
rooms: Record<string, IRoomKeysResponse>;
|
888
|
-
}
|
889
|
-
|
890
714
|
interface IRoomHierarchy {
|
891
715
|
rooms: IHierarchyRoom[];
|
892
716
|
next_batch?: string;
|
@@ -945,26 +769,6 @@ type RoomStateEvents =
|
|
945
769
|
| RoomStateEvent.Update
|
946
770
|
| RoomStateEvent.Marker;
|
947
771
|
|
948
|
-
type LegacyCryptoEvents =
|
949
|
-
| LegacyCryptoEvent.KeySignatureUploadFailure
|
950
|
-
| LegacyCryptoEvent.KeyBackupStatus
|
951
|
-
| LegacyCryptoEvent.KeyBackupFailed
|
952
|
-
| LegacyCryptoEvent.KeyBackupSessionsRemaining
|
953
|
-
| LegacyCryptoEvent.KeyBackupDecryptionKeyCached
|
954
|
-
| LegacyCryptoEvent.RoomKeyRequest
|
955
|
-
| LegacyCryptoEvent.RoomKeyRequestCancellation
|
956
|
-
| LegacyCryptoEvent.VerificationRequest
|
957
|
-
| LegacyCryptoEvent.VerificationRequestReceived
|
958
|
-
| LegacyCryptoEvent.DeviceVerificationChanged
|
959
|
-
| LegacyCryptoEvent.UserTrustStatusChanged
|
960
|
-
| LegacyCryptoEvent.KeysChanged
|
961
|
-
| LegacyCryptoEvent.Warning
|
962
|
-
| LegacyCryptoEvent.DevicesUpdated
|
963
|
-
| LegacyCryptoEvent.WillUpdateDevices
|
964
|
-
| LegacyCryptoEvent.LegacyCryptoStoreMigrationProgress;
|
965
|
-
|
966
|
-
type CryptoEvents = (typeof CryptoEvent)[keyof typeof CryptoEvent];
|
967
|
-
|
968
772
|
type MatrixEventEvents = MatrixEventEvent.Decrypted | MatrixEventEvent.Replaced | MatrixEventEvent.VisibilityChange;
|
969
773
|
|
970
774
|
type RoomMemberEvents =
|
@@ -984,17 +788,9 @@ export type EmittedEvents =
|
|
984
788
|
| ClientEvent
|
985
789
|
| RoomEvents
|
986
790
|
| RoomStateEvents
|
987
|
-
| LegacyCryptoEvents
|
988
|
-
| CryptoEvents
|
989
791
|
| MatrixEventEvents
|
990
792
|
| RoomMemberEvents
|
991
793
|
| UserEvents
|
992
|
-
| CallEvent // re-emitted by call.ts using Object.values
|
993
|
-
| CallEventHandlerEvent.Incoming
|
994
|
-
| GroupCallEventHandlerEvent.Incoming
|
995
|
-
| GroupCallEventHandlerEvent.Outgoing
|
996
|
-
| GroupCallEventHandlerEvent.Ended
|
997
|
-
| GroupCallEventHandlerEvent.Participants
|
998
794
|
| HttpApiEvent.SessionLoggedOut
|
999
795
|
| HttpApiEvent.NoConsent
|
1000
796
|
| BeaconEvent;
|
@@ -1196,14 +992,9 @@ export type ClientEventHandlerMap = {
|
|
1196
992
|
[ClientEvent.TurnServersError]: (error: Error, fatal: boolean) => void;
|
1197
993
|
} & RoomEventHandlerMap &
|
1198
994
|
RoomStateEventHandlerMap &
|
1199
|
-
LegacyCryptoEventHandlerMap &
|
1200
|
-
CryptoEventHandlerMap &
|
1201
995
|
MatrixEventHandlerMap &
|
1202
996
|
RoomMemberEventHandlerMap &
|
1203
997
|
UserEventHandlerMap &
|
1204
|
-
CallEventHandlerEventHandlerMap &
|
1205
|
-
GroupCallEventHandlerEventHandlerMap &
|
1206
|
-
CallEventHandlerMap &
|
1207
998
|
HttpApiEventHandlerMap &
|
1208
999
|
BeaconEventHandlerMap;
|
1209
1000
|
|
@@ -1226,17 +1017,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1226
1017
|
public deviceId: string | null;
|
1227
1018
|
public credentials: { userId: string | null };
|
1228
1019
|
|
1229
|
-
/**
|
1230
|
-
* Encryption key used for encrypting sensitive data (such as e2ee keys) in storage.
|
1231
|
-
*
|
1232
|
-
* As supplied in the constructor via {@link IMatrixClientCreateOpts#pickleKey}.
|
1233
|
-
*
|
1234
|
-
* If unset, either a hardcoded key or no encryption at all is used, depending on the Crypto implementation.
|
1235
|
-
*
|
1236
|
-
* @deprecated this should be a private property.
|
1237
|
-
*/
|
1238
|
-
public pickleKey?: string;
|
1239
|
-
|
1240
1020
|
public scheduler?: MatrixScheduler;
|
1241
1021
|
public clientRunning = false;
|
1242
1022
|
public timelineSupport = false;
|
@@ -1244,20 +1024,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1244
1024
|
public identityServer?: IIdentityServerProvider;
|
1245
1025
|
public http: MatrixHttpApi<IHttpOpts & { onlyData: true }>; // XXX: Intended private, used in code.
|
1246
1026
|
|
1247
|
-
/**
|
1248
|
-
* The libolm crypto implementation, if it is in use.
|
1249
|
-
*
|
1250
|
-
* @deprecated This should not be used. Instead, use the methods exposed directly on this class or
|
1251
|
-
* (where they are available) via {@link getCrypto}.
|
1252
|
-
*/
|
1253
|
-
public crypto?: Crypto; // XXX: Intended private, used in code. Being replaced by cryptoBackend
|
1254
|
-
|
1255
|
-
private cryptoBackend?: CryptoBackend; // one of crypto or rustCrypto
|
1256
|
-
public cryptoCallbacks: CryptoCallbacks; // XXX: Intended private, used in code.
|
1257
|
-
public callEventHandler?: CallEventHandler; // XXX: Intended private, used in code.
|
1258
|
-
public groupCallEventHandler?: GroupCallEventHandler;
|
1259
|
-
public supportsCallTransfer = false; // XXX: Intended private, used in code.
|
1260
|
-
public forceTURN = false; // XXX: Intended private, used in code.
|
1261
1027
|
public iceCandidatePoolSize = 0; // XXX: Intended private, used in code.
|
1262
1028
|
public idBaseUrl?: string;
|
1263
1029
|
public baseUrl: string;
|
@@ -1268,13 +1034,11 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1268
1034
|
// Note: these are all `protected` to let downstream consumers make mistakes if they want to.
|
1269
1035
|
// We don't technically support this usage, but have reasons to do this.
|
1270
1036
|
|
1271
|
-
protected canSupportVoip = false;
|
1272
1037
|
protected peekSync: SyncApi | null = null;
|
1273
1038
|
protected isGuestAccount = false;
|
1274
1039
|
protected ongoingScrollbacks: { [roomId: string]: { promise?: Promise<Room>; errorTs?: number } } = {};
|
1275
1040
|
protected notifTimelineSet: EventTimelineSet | null = null;
|
1276
1041
|
/* @deprecated */
|
1277
|
-
protected cryptoStore?: CryptoStore;
|
1278
1042
|
protected verificationMethods?: string[];
|
1279
1043
|
protected fallbackICEServerAllowed = false;
|
1280
1044
|
protected syncApi?: SlidingSyncSdk | SyncApi;
|
@@ -1297,12 +1061,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1297
1061
|
|
1298
1062
|
protected clientWellKnown?: IClientWellKnown;
|
1299
1063
|
protected clientWellKnownPromise?: Promise<IClientWellKnown>;
|
1300
|
-
protected turnServers: ITurnServer[] = [];
|
1301
|
-
protected turnServersExpiry = 0;
|
1302
|
-
protected checkTurnServersIntervalID?: ReturnType<typeof setInterval>;
|
1303
|
-
protected exportedOlmDeviceToImport?: IExportedOlmDevice;
|
1304
1064
|
protected txnCtr = 0;
|
1305
|
-
protected mediaHandler = new MediaHandler(this);
|
1306
1065
|
protected sessionId: string;
|
1307
1066
|
|
1308
1067
|
/** IDs of events which are currently being encrypted.
|
@@ -1312,17 +1071,12 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1312
1071
|
*/
|
1313
1072
|
private eventsBeingEncrypted = new Set<string>();
|
1314
1073
|
|
1315
|
-
private useE2eForGroupCall = true;
|
1316
1074
|
private toDeviceMessageQueue: ToDeviceMessageQueue;
|
1317
1075
|
public livekitServiceURL?: string;
|
1318
1076
|
|
1319
|
-
private _secretStorage: ServerSideSecretStorageImpl;
|
1320
|
-
|
1321
1077
|
// A manager for determining which invites should be ignored.
|
1322
1078
|
public readonly ignoredInvites: IgnoredInvites;
|
1323
1079
|
|
1324
|
-
public readonly matrixRTC: MatrixRTCSessionManager;
|
1325
|
-
|
1326
1080
|
private serverCapabilitiesService: ServerCapabilities;
|
1327
1081
|
|
1328
1082
|
public constructor(opts: IMatrixClientCreateOpts) {
|
@@ -1342,7 +1096,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1342
1096
|
this.usingExternalCrypto = opts.usingExternalCrypto ?? false;
|
1343
1097
|
this.store = opts.store || new StubStore();
|
1344
1098
|
this.deviceId = opts.deviceId || null;
|
1345
|
-
this.sessionId =
|
1099
|
+
this.sessionId = secureRandomString(10);
|
1346
1100
|
|
1347
1101
|
const userId = opts.userId || null;
|
1348
1102
|
this.credentials = { userId };
|
@@ -1366,23 +1120,19 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1366
1120
|
if (this.deviceId) {
|
1367
1121
|
this.logger.warn(
|
1368
1122
|
"not importing device because device ID is provided to " +
|
1369
|
-
|
1123
|
+
"constructor independently of exported data",
|
1370
1124
|
);
|
1371
1125
|
} else if (this.credentials.userId) {
|
1372
1126
|
this.logger.warn(
|
1373
1127
|
"not importing device because user ID is provided to " +
|
1374
|
-
|
1128
|
+
"constructor independently of exported data",
|
1375
1129
|
);
|
1376
1130
|
} else if (!opts.deviceToImport.deviceId) {
|
1377
1131
|
this.logger.warn("not importing device because no device ID in exported data");
|
1378
1132
|
} else {
|
1379
1133
|
this.deviceId = opts.deviceToImport.deviceId;
|
1380
1134
|
this.credentials.userId = opts.deviceToImport.userId;
|
1381
|
-
// will be used during async initialization of the crypto
|
1382
|
-
this.exportedOlmDeviceToImport = opts.deviceToImport.olmDevice;
|
1383
1135
|
}
|
1384
|
-
} else if (opts.pickleKey) {
|
1385
|
-
this.pickleKey = opts.pickleKey;
|
1386
1136
|
}
|
1387
1137
|
|
1388
1138
|
this.useLivekitForGroupCalls = Boolean(opts.useLivekitForGroupCalls);
|
@@ -1404,54 +1154,25 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1404
1154
|
});
|
1405
1155
|
}
|
1406
1156
|
|
1407
|
-
if (supportsMatrixCall()) {
|
1408
|
-
this.callEventHandler = new CallEventHandler(this);
|
1409
|
-
this.groupCallEventHandler = new GroupCallEventHandler(this);
|
1410
|
-
this.canSupportVoip = true;
|
1411
|
-
// Start listening for calls after the initial sync is done
|
1412
|
-
// We do not need to backfill the call event buffer
|
1413
|
-
// with encrypted events that might never get decrypted
|
1414
|
-
this.on(ClientEvent.Sync, this.startCallEventHandler);
|
1415
|
-
}
|
1416
|
-
|
1417
|
-
// NB. We initialise MatrixRTC whether we have call support or not: this is just
|
1418
|
-
// the underlying session management and doesn't use any actual media capabilities
|
1419
|
-
this.matrixRTC = new MatrixRTCSessionManager(this);
|
1420
|
-
|
1421
1157
|
this.serverCapabilitiesService = new ServerCapabilities(this.http);
|
1422
1158
|
|
1423
1159
|
this.on(ClientEvent.Sync, this.fixupRoomNotifications);
|
1424
1160
|
|
1425
1161
|
this.timelineSupport = Boolean(opts.timelineSupport);
|
1426
1162
|
|
1427
|
-
this.cryptoStore = opts.cryptoStore;
|
1428
1163
|
this.verificationMethods = opts.verificationMethods;
|
1429
|
-
this.cryptoCallbacks = opts.cryptoCallbacks || {};
|
1430
1164
|
|
1431
|
-
this.forceTURN = opts.forceTURN || false;
|
1432
1165
|
this.iceCandidatePoolSize = opts.iceCandidatePoolSize === undefined ? 0 : opts.iceCandidatePoolSize;
|
1433
|
-
this.supportsCallTransfer = opts.supportsCallTransfer || false;
|
1434
1166
|
this.fallbackICEServerAllowed = opts.fallbackICEServerAllowed || false;
|
1435
1167
|
this.isVoipWithNoMediaAllowed = opts.isVoipWithNoMediaAllowed || false;
|
1436
1168
|
|
1437
|
-
if (opts.useE2eForGroupCall !== undefined) this.useE2eForGroupCall = opts.useE2eForGroupCall;
|
1438
|
-
|
1439
1169
|
this.livekitServiceURL = opts.livekitServiceURL;
|
1440
1170
|
|
1441
1171
|
this.roomNameGenerator = opts.roomNameGenerator;
|
1442
1172
|
|
1443
1173
|
this.toDeviceMessageQueue = new ToDeviceMessageQueue(this);
|
1444
1174
|
|
1445
|
-
// The SDK doesn't really provide a clean way for events to recalculate the push
|
1446
|
-
// actions for themselves, so we have to kinda help them out when they are encrypted.
|
1447
|
-
// We do this so that push rules are correctly executed on events in their decrypted
|
1448
|
-
// state, such as highlights when the user's name is mentioned.
|
1449
|
-
this.on(MatrixEventEvent.Decrypted, (event) => {
|
1450
|
-
fixNotificationCountOnDecryption(this, event);
|
1451
|
-
});
|
1452
|
-
|
1453
1175
|
this.ignoredInvites = new IgnoredInvites(this);
|
1454
|
-
this._secretStorage = new ServerSideSecretStorageImpl(this, opts.cryptoCallbacks ?? {});
|
1455
1176
|
|
1456
1177
|
// having lots of event listeners is not unusual. 0 means "unlimited".
|
1457
1178
|
this.setMaxListeners(0);
|
@@ -1480,8 +1201,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1480
1201
|
}
|
1481
1202
|
this.clientRunning = true;
|
1482
1203
|
|
1483
|
-
this.on(ClientEvent.Sync, this.startMatrixRTC);
|
1484
|
-
|
1485
1204
|
// Create our own user object artificially (instead of waiting for sync)
|
1486
1205
|
// so it's always available, even if the user is not in any rooms etc.
|
1487
1206
|
const userId = this.getUserId();
|
@@ -1489,15 +1208,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1489
1208
|
this.store.storeUser(new User(userId));
|
1490
1209
|
}
|
1491
1210
|
|
1492
|
-
// periodically poll for turn servers if we support voip
|
1493
|
-
if (this.canSupportVoip) {
|
1494
|
-
this.checkTurnServersIntervalID = setInterval(() => {
|
1495
|
-
this.checkTurnServers();
|
1496
|
-
}, TURN_CHECK_INTERVAL);
|
1497
|
-
// noinspection ES6MissingAwait
|
1498
|
-
this.checkTurnServers();
|
1499
|
-
}
|
1500
|
-
|
1501
1211
|
if (this.syncApi) {
|
1502
1212
|
// This shouldn't happen since we thought the client was not running
|
1503
1213
|
this.logger.error("Still have sync object whilst not running: stopping old one");
|
@@ -1526,7 +1236,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1526
1236
|
this.clientOpts.slidingSync,
|
1527
1237
|
this,
|
1528
1238
|
this.clientOpts,
|
1529
|
-
this.buildSyncApiOptions(),
|
1530
1239
|
);
|
1531
1240
|
} else {
|
1532
1241
|
this.syncApi = new SyncApi(this, this.clientOpts, this.buildSyncApiOptions());
|
@@ -1550,8 +1259,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1550
1259
|
*/
|
1551
1260
|
protected buildSyncApiOptions(): SyncApiOptions {
|
1552
1261
|
return {
|
1553
|
-
crypto: this.crypto,
|
1554
|
-
cryptoCallbacks: this.cryptoBackend,
|
1555
1262
|
canResetEntireTimeline: (roomId: string): boolean => {
|
1556
1263
|
if (!this.canResetTimelineCallback) {
|
1557
1264
|
return false;
|
@@ -1566,10 +1273,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1566
1273
|
* clean shutdown.
|
1567
1274
|
*/
|
1568
1275
|
public stopClient(): void {
|
1569
|
-
this.cryptoBackend?.stop(); // crypto might have been initialised even if the client wasn't fully started
|
1570
|
-
|
1571
|
-
this.off(ClientEvent.Sync, this.startMatrixRTC);
|
1572
|
-
|
1573
1276
|
if (!this.clientRunning) return; // already stopped
|
1574
1277
|
|
1575
1278
|
this.logger.debug("stopping MatrixClient");
|
@@ -1581,190 +1284,15 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1581
1284
|
|
1582
1285
|
this.peekSync?.stopPeeking();
|
1583
1286
|
|
1584
|
-
this.callEventHandler?.stop();
|
1585
|
-
this.groupCallEventHandler?.stop();
|
1586
|
-
this.callEventHandler = undefined;
|
1587
|
-
this.groupCallEventHandler = undefined;
|
1588
|
-
|
1589
|
-
globalThis.clearInterval(this.checkTurnServersIntervalID);
|
1590
|
-
this.checkTurnServersIntervalID = undefined;
|
1591
|
-
|
1592
1287
|
if (this.clientWellKnownIntervalID !== undefined) {
|
1593
1288
|
globalThis.clearInterval(this.clientWellKnownIntervalID);
|
1594
1289
|
}
|
1595
1290
|
|
1596
1291
|
this.toDeviceMessageQueue.stop();
|
1597
1292
|
|
1598
|
-
this.matrixRTC.stop();
|
1599
|
-
|
1600
1293
|
this.serverCapabilitiesService.stop();
|
1601
1294
|
}
|
1602
1295
|
|
1603
|
-
/**
|
1604
|
-
* Try to rehydrate a device if available. The client must have been
|
1605
|
-
* initialized with a `cryptoCallback.getDehydrationKey` option, and this
|
1606
|
-
* function must be called before initCrypto and startClient are called.
|
1607
|
-
*
|
1608
|
-
* @returns Promise which resolves to undefined if a device could not be dehydrated, or
|
1609
|
-
* to the new device ID if the dehydration was successful.
|
1610
|
-
* @returns Rejects: with an error response.
|
1611
|
-
*
|
1612
|
-
* @deprecated MSC2697 device dehydration is not supported for rust cryptography.
|
1613
|
-
*/
|
1614
|
-
public async rehydrateDevice(): Promise<string | undefined> {
|
1615
|
-
if (this.crypto) {
|
1616
|
-
throw new Error("Cannot rehydrate device after crypto is initialized");
|
1617
|
-
}
|
1618
|
-
|
1619
|
-
if (!this.cryptoCallbacks.getDehydrationKey) {
|
1620
|
-
return;
|
1621
|
-
}
|
1622
|
-
|
1623
|
-
const getDeviceResult = await this.getDehydratedDevice();
|
1624
|
-
if (!getDeviceResult) {
|
1625
|
-
return;
|
1626
|
-
}
|
1627
|
-
|
1628
|
-
if (!getDeviceResult.device_data || !getDeviceResult.device_id) {
|
1629
|
-
this.logger.info("no dehydrated device found");
|
1630
|
-
return;
|
1631
|
-
}
|
1632
|
-
|
1633
|
-
const account = new globalThis.Olm.Account();
|
1634
|
-
try {
|
1635
|
-
const deviceData = getDeviceResult.device_data;
|
1636
|
-
if (deviceData.algorithm !== DEHYDRATION_ALGORITHM) {
|
1637
|
-
this.logger.warn("Wrong algorithm for dehydrated device");
|
1638
|
-
return;
|
1639
|
-
}
|
1640
|
-
this.logger.debug("unpickling dehydrated device");
|
1641
|
-
const key = await this.cryptoCallbacks.getDehydrationKey(deviceData, (k) => {
|
1642
|
-
// copy the key so that it doesn't get clobbered
|
1643
|
-
account.unpickle(new Uint8Array(k), deviceData.account);
|
1644
|
-
});
|
1645
|
-
account.unpickle(key, deviceData.account);
|
1646
|
-
this.logger.debug("unpickled device");
|
1647
|
-
|
1648
|
-
const rehydrateResult = await this.http.authedRequest<{ success: boolean }>(
|
1649
|
-
Method.Post,
|
1650
|
-
"/dehydrated_device/claim",
|
1651
|
-
undefined,
|
1652
|
-
{
|
1653
|
-
device_id: getDeviceResult.device_id,
|
1654
|
-
},
|
1655
|
-
{
|
1656
|
-
prefix: "/_matrix/client/unstable/org.matrix.msc2697.v2",
|
1657
|
-
},
|
1658
|
-
);
|
1659
|
-
|
1660
|
-
if (rehydrateResult.success) {
|
1661
|
-
this.deviceId = getDeviceResult.device_id;
|
1662
|
-
this.logger.info("using dehydrated device");
|
1663
|
-
const pickleKey = this.pickleKey || "DEFAULT_KEY";
|
1664
|
-
this.exportedOlmDeviceToImport = {
|
1665
|
-
pickledAccount: account.pickle(pickleKey),
|
1666
|
-
sessions: [],
|
1667
|
-
pickleKey: pickleKey,
|
1668
|
-
};
|
1669
|
-
account.free();
|
1670
|
-
return this.deviceId;
|
1671
|
-
} else {
|
1672
|
-
account.free();
|
1673
|
-
this.logger.info("not using dehydrated device");
|
1674
|
-
return;
|
1675
|
-
}
|
1676
|
-
} catch (e) {
|
1677
|
-
account.free();
|
1678
|
-
this.logger.warn("could not unpickle", e);
|
1679
|
-
}
|
1680
|
-
}
|
1681
|
-
|
1682
|
-
/**
|
1683
|
-
* Get the current dehydrated device, if any
|
1684
|
-
* @returns A promise of an object containing the dehydrated device
|
1685
|
-
*
|
1686
|
-
* @deprecated MSC2697 device dehydration is not supported for rust cryptography.
|
1687
|
-
*/
|
1688
|
-
public async getDehydratedDevice(): Promise<IDehydratedDevice | undefined> {
|
1689
|
-
try {
|
1690
|
-
return await this.http.authedRequest<IDehydratedDevice>(
|
1691
|
-
Method.Get,
|
1692
|
-
"/dehydrated_device",
|
1693
|
-
undefined,
|
1694
|
-
undefined,
|
1695
|
-
{
|
1696
|
-
prefix: "/_matrix/client/unstable/org.matrix.msc2697.v2",
|
1697
|
-
},
|
1698
|
-
);
|
1699
|
-
} catch (e) {
|
1700
|
-
this.logger.info("could not get dehydrated device", e);
|
1701
|
-
return;
|
1702
|
-
}
|
1703
|
-
}
|
1704
|
-
|
1705
|
-
/**
|
1706
|
-
* Set the dehydration key. This will also periodically dehydrate devices to
|
1707
|
-
* the server.
|
1708
|
-
*
|
1709
|
-
* @param key - the dehydration key
|
1710
|
-
* @param keyInfo - Information about the key. Primarily for
|
1711
|
-
* information about how to generate the key from a passphrase.
|
1712
|
-
* @param deviceDisplayName - The device display name for the
|
1713
|
-
* dehydrated device.
|
1714
|
-
* @returns A promise that resolves when the dehydrated device is stored.
|
1715
|
-
*
|
1716
|
-
* @deprecated Not supported for Rust Cryptography.
|
1717
|
-
*/
|
1718
|
-
public async setDehydrationKey(
|
1719
|
-
key: Uint8Array,
|
1720
|
-
keyInfo: IDehydratedDeviceKeyInfo,
|
1721
|
-
deviceDisplayName?: string,
|
1722
|
-
): Promise<void> {
|
1723
|
-
if (!this.crypto) {
|
1724
|
-
this.logger.warn("not dehydrating device if crypto is not enabled");
|
1725
|
-
return;
|
1726
|
-
}
|
1727
|
-
return this.crypto.dehydrationManager.setKeyAndQueueDehydration(key, keyInfo, deviceDisplayName);
|
1728
|
-
}
|
1729
|
-
|
1730
|
-
/**
|
1731
|
-
* Creates a new MSC2967 dehydrated device (without queuing periodic dehydration)
|
1732
|
-
* @param key - the dehydration key
|
1733
|
-
* @param keyInfo - Information about the key. Primarily for
|
1734
|
-
* information about how to generate the key from a passphrase.
|
1735
|
-
* @param deviceDisplayName - The device display name for the
|
1736
|
-
* dehydrated device.
|
1737
|
-
* @returns the device id of the newly created dehydrated device
|
1738
|
-
*
|
1739
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.startDehydration}.
|
1740
|
-
*/
|
1741
|
-
public async createDehydratedDevice(
|
1742
|
-
key: Uint8Array,
|
1743
|
-
keyInfo: IDehydratedDeviceKeyInfo,
|
1744
|
-
deviceDisplayName?: string,
|
1745
|
-
): Promise<string | undefined> {
|
1746
|
-
if (!this.crypto) {
|
1747
|
-
this.logger.warn("not dehydrating device if crypto is not enabled");
|
1748
|
-
return;
|
1749
|
-
}
|
1750
|
-
await this.crypto.dehydrationManager.setKey(key, keyInfo, deviceDisplayName);
|
1751
|
-
return this.crypto.dehydrationManager.dehydrateDevice();
|
1752
|
-
}
|
1753
|
-
|
1754
|
-
/** @deprecated Not supported for Rust Cryptography. */
|
1755
|
-
public async exportDevice(): Promise<IExportedDevice | undefined> {
|
1756
|
-
if (!this.crypto) {
|
1757
|
-
this.logger.warn("not exporting device if crypto is not enabled");
|
1758
|
-
return;
|
1759
|
-
}
|
1760
|
-
return {
|
1761
|
-
userId: this.credentials.userId!,
|
1762
|
-
deviceId: this.deviceId!,
|
1763
|
-
// XXX: Private member access.
|
1764
|
-
olmDevice: await this.crypto.olmDevice.export(),
|
1765
|
-
};
|
1766
|
-
}
|
1767
|
-
|
1768
1296
|
/**
|
1769
1297
|
* Clear any data out of the persistent stores used by the client.
|
1770
1298
|
*
|
@@ -1778,48 +1306,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1778
1306
|
const promises: Promise<void>[] = [];
|
1779
1307
|
|
1780
1308
|
promises.push(this.store.deleteAllData());
|
1781
|
-
if (this.cryptoStore) {
|
1782
|
-
promises.push(this.cryptoStore.deleteAllData());
|
1783
|
-
}
|
1784
|
-
|
1785
|
-
// delete the stores used by the rust matrix-sdk-crypto, in case they were used
|
1786
|
-
const deleteRustSdkStore = async (): Promise<void> => {
|
1787
|
-
let indexedDB: IDBFactory;
|
1788
|
-
try {
|
1789
|
-
indexedDB = globalThis.indexedDB;
|
1790
|
-
if (!indexedDB) return; // No indexedDB support
|
1791
|
-
} catch {
|
1792
|
-
// No indexedDB support
|
1793
|
-
return;
|
1794
|
-
}
|
1795
|
-
for (const dbname of [
|
1796
|
-
`${RUST_SDK_STORE_PREFIX}::matrix-sdk-crypto`,
|
1797
|
-
`${RUST_SDK_STORE_PREFIX}::matrix-sdk-crypto-meta`,
|
1798
|
-
]) {
|
1799
|
-
const prom = new Promise((resolve, reject) => {
|
1800
|
-
this.logger.info(`Removing IndexedDB instance ${dbname}`);
|
1801
|
-
const req = indexedDB.deleteDatabase(dbname);
|
1802
|
-
req.onsuccess = (_): void => {
|
1803
|
-
this.logger.info(`Removed IndexedDB instance ${dbname}`);
|
1804
|
-
resolve(0);
|
1805
|
-
};
|
1806
|
-
req.onerror = (e): void => {
|
1807
|
-
// In private browsing, Firefox has a globalThis.indexedDB, but attempts to delete an indexeddb
|
1808
|
-
// (even a non-existent one) fail with "DOMException: A mutation operation was attempted on a
|
1809
|
-
// database that did not allow mutations."
|
1810
|
-
//
|
1811
|
-
// it seems like the only thing we can really do is ignore the error.
|
1812
|
-
this.logger.warn(`Failed to remove IndexedDB instance ${dbname}:`, e);
|
1813
|
-
resolve(0);
|
1814
|
-
};
|
1815
|
-
req.onblocked = (e): void => {
|
1816
|
-
this.logger.info(`cannot yet remove IndexedDB instance ${dbname}`);
|
1817
|
-
};
|
1818
|
-
});
|
1819
|
-
await prom;
|
1820
|
-
}
|
1821
|
-
};
|
1822
|
-
promises.push(deleteRustSdkStore());
|
1823
1309
|
|
1824
1310
|
return Promise.all(promises).then(); // .then to fix types
|
1825
1311
|
}
|
@@ -1830,10 +1316,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1830
1316
|
* @returns MXID for the logged-in user, or null if not logged in
|
1831
1317
|
*/
|
1832
1318
|
public getUserId(): string | null {
|
1833
|
-
|
1834
|
-
return this.credentials.userId;
|
1835
|
-
}
|
1836
|
-
return null;
|
1319
|
+
return this.credentials?.userId ?? null;
|
1837
1320
|
}
|
1838
1321
|
|
1839
1322
|
/**
|
@@ -1855,7 +1338,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1855
1338
|
* @returns Domain of this MXID
|
1856
1339
|
*/
|
1857
1340
|
public getDomain(): string | null {
|
1858
|
-
if (this.credentials
|
1341
|
+
if (this.credentials?.userId) {
|
1859
1342
|
return this.credentials.userId.replace(/^.*?:/, "");
|
1860
1343
|
}
|
1861
1344
|
return null;
|
@@ -1866,10 +1349,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1866
1349
|
* @returns The user ID localpart or null.
|
1867
1350
|
*/
|
1868
1351
|
public getUserIdLocalpart(): string | null {
|
1869
|
-
|
1870
|
-
return this.credentials.userId.split(":")[0].substring(1);
|
1871
|
-
}
|
1872
|
-
return null;
|
1352
|
+
return this.credentials?.userId?.split(":")[0].substring(1) ?? null;
|
1873
1353
|
}
|
1874
1354
|
|
1875
1355
|
/**
|
@@ -1888,100 +1368,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1888
1368
|
return this.sessionId;
|
1889
1369
|
}
|
1890
1370
|
|
1891
|
-
/**
|
1892
|
-
* Check if the runtime environment supports VoIP calling.
|
1893
|
-
* @returns True if VoIP is supported.
|
1894
|
-
*/
|
1895
|
-
public supportsVoip(): boolean {
|
1896
|
-
return this.canSupportVoip;
|
1897
|
-
}
|
1898
|
-
|
1899
|
-
/**
|
1900
|
-
* @returns
|
1901
|
-
*/
|
1902
|
-
public getMediaHandler(): MediaHandler {
|
1903
|
-
return this.mediaHandler;
|
1904
|
-
}
|
1905
|
-
|
1906
|
-
/**
|
1907
|
-
* Set whether VoIP calls are forced to use only TURN
|
1908
|
-
* candidates. This is the same as the forceTURN option
|
1909
|
-
* when creating the client.
|
1910
|
-
* @param force - True to force use of TURN servers
|
1911
|
-
*/
|
1912
|
-
public setForceTURN(force: boolean): void {
|
1913
|
-
this.forceTURN = force;
|
1914
|
-
}
|
1915
|
-
|
1916
|
-
/**
|
1917
|
-
* Set whether to advertise transfer support to other parties on Matrix calls.
|
1918
|
-
* @param support - True to advertise the 'm.call.transferee' capability
|
1919
|
-
*/
|
1920
|
-
public setSupportsCallTransfer(support: boolean): void {
|
1921
|
-
this.supportsCallTransfer = support;
|
1922
|
-
}
|
1923
|
-
|
1924
|
-
/**
|
1925
|
-
* Returns true if to-device signalling for group calls will be encrypted with Olm.
|
1926
|
-
* If false, it will be sent unencrypted.
|
1927
|
-
* @returns boolean Whether group call signalling will be encrypted
|
1928
|
-
*/
|
1929
|
-
public getUseE2eForGroupCall(): boolean {
|
1930
|
-
return this.useE2eForGroupCall;
|
1931
|
-
}
|
1932
|
-
|
1933
|
-
/**
|
1934
|
-
* Creates a new call.
|
1935
|
-
* The place*Call methods on the returned call can be used to actually place a call
|
1936
|
-
*
|
1937
|
-
* @param roomId - The room the call is to be placed in.
|
1938
|
-
* @returns the call or null if the browser doesn't support calling.
|
1939
|
-
*/
|
1940
|
-
public createCall(roomId: string): MatrixCall | null {
|
1941
|
-
return createNewMatrixCall(this, roomId);
|
1942
|
-
}
|
1943
|
-
|
1944
|
-
/**
|
1945
|
-
* Creates a new group call and sends the associated state event
|
1946
|
-
* to alert other members that the room now has a group call.
|
1947
|
-
*
|
1948
|
-
* @param roomId - The room the call is to be placed in.
|
1949
|
-
*/
|
1950
|
-
public async createGroupCall(
|
1951
|
-
roomId: string,
|
1952
|
-
type: GroupCallType,
|
1953
|
-
isPtt: boolean,
|
1954
|
-
intent: GroupCallIntent,
|
1955
|
-
dataChannelsEnabled?: boolean,
|
1956
|
-
dataChannelOptions?: IGroupCallDataChannelOptions,
|
1957
|
-
): Promise<GroupCall> {
|
1958
|
-
if (this.getGroupCallForRoom(roomId)) {
|
1959
|
-
throw new Error(`${roomId} already has an existing group call`);
|
1960
|
-
}
|
1961
|
-
|
1962
|
-
const room = this.getRoom(roomId);
|
1963
|
-
|
1964
|
-
if (!room) {
|
1965
|
-
throw new Error(`Cannot find room ${roomId}`);
|
1966
|
-
}
|
1967
|
-
|
1968
|
-
// Because without Media section a WebRTC connection is not possible, so need a RTCDataChannel to set up a
|
1969
|
-
// no media WebRTC connection anyway.
|
1970
|
-
return new GroupCall(
|
1971
|
-
this,
|
1972
|
-
room,
|
1973
|
-
type,
|
1974
|
-
isPtt,
|
1975
|
-
intent,
|
1976
|
-
undefined,
|
1977
|
-
dataChannelsEnabled || this.isVoipWithNoMediaAllowed,
|
1978
|
-
dataChannelOptions,
|
1979
|
-
this.isVoipWithNoMediaAllowed,
|
1980
|
-
this.useLivekitForGroupCalls,
|
1981
|
-
this.livekitServiceURL,
|
1982
|
-
).create();
|
1983
|
-
}
|
1984
|
-
|
1985
1371
|
public getLivekitServiceURL(): string | undefined {
|
1986
1372
|
return this.livekitServiceURL;
|
1987
1373
|
}
|
@@ -1992,29 +1378,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
1992
1378
|
this.livekitServiceURL = newURL;
|
1993
1379
|
}
|
1994
1380
|
|
1995
|
-
/**
|
1996
|
-
* Wait until an initial state for the given room has been processed by the
|
1997
|
-
* client and the client is aware of any ongoing group calls. Awaiting on
|
1998
|
-
* the promise returned by this method before calling getGroupCallForRoom()
|
1999
|
-
* avoids races where getGroupCallForRoom is called before the state for that
|
2000
|
-
* room has been processed. It does not, however, fix other races, eg. two
|
2001
|
-
* clients both creating a group call at the same time.
|
2002
|
-
* @param roomId - The room ID to wait for
|
2003
|
-
* @returns A promise that resolves once existing group calls in the room
|
2004
|
-
* have been processed.
|
2005
|
-
*/
|
2006
|
-
public waitUntilRoomReadyForGroupCalls(roomId: string): Promise<void> {
|
2007
|
-
return this.groupCallEventHandler!.waitUntilRoomReadyForGroupCalls(roomId);
|
2008
|
-
}
|
2009
|
-
|
2010
|
-
/**
|
2011
|
-
* Get an existing group call for the provided room.
|
2012
|
-
* @returns The group call or null if it doesn't already exist.
|
2013
|
-
*/
|
2014
|
-
public getGroupCallForRoom(roomId: string): GroupCall | null {
|
2015
|
-
return this.groupCallEventHandler!.groupCalls.get(roomId) || null;
|
2016
|
-
}
|
2017
|
-
|
2018
1381
|
/**
|
2019
1382
|
* Get the current sync state.
|
2020
1383
|
* @returns the sync state, which may be null.
|
@@ -2066,2082 +1429,85 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
2066
1429
|
* access token, which means that the SDK can determine this entirely without
|
2067
1430
|
* the dev manually flipping this flag.
|
2068
1431
|
*/
|
2069
|
-
public setGuest(guest: boolean): void {
|
2070
|
-
this.isGuestAccount = guest;
|
2071
|
-
}
|
2072
|
-
|
2073
|
-
/**
|
2074
|
-
* Return the provided scheduler, if any.
|
2075
|
-
* @returns The scheduler or undefined
|
2076
|
-
*/
|
2077
|
-
public getScheduler(): MatrixScheduler | undefined {
|
2078
|
-
return this.scheduler;
|
2079
|
-
}
|
2080
|
-
|
2081
|
-
/**
|
2082
|
-
* Retry a backed off syncing request immediately. This should only be used when
|
2083
|
-
* the user <b>explicitly</b> attempts to retry their lost connection.
|
2084
|
-
* Will also retry any outbound to-device messages currently in the queue to be sent
|
2085
|
-
* (retries of regular outgoing events are handled separately, per-event).
|
2086
|
-
* @returns True if this resulted in a request being retried.
|
2087
|
-
*/
|
2088
|
-
public retryImmediately(): boolean {
|
2089
|
-
// don't await for this promise: we just want to kick it off
|
2090
|
-
this.toDeviceMessageQueue.sendQueue();
|
2091
|
-
return this.syncApi?.retryImmediately() ?? false;
|
2092
|
-
}
|
2093
|
-
|
2094
|
-
/**
|
2095
|
-
* Return the global notification EventTimelineSet, if any
|
2096
|
-
*
|
2097
|
-
* @returns the globl notification EventTimelineSet
|
2098
|
-
*/
|
2099
|
-
public getNotifTimelineSet(): EventTimelineSet | null {
|
2100
|
-
return this.notifTimelineSet;
|
2101
|
-
}
|
2102
|
-
|
2103
|
-
/**
|
2104
|
-
* Set the global notification EventTimelineSet
|
2105
|
-
*
|
2106
|
-
*/
|
2107
|
-
public setNotifTimelineSet(set: EventTimelineSet): void {
|
2108
|
-
this.notifTimelineSet = set;
|
2109
|
-
}
|
2110
|
-
|
2111
|
-
/**
|
2112
|
-
* Gets the cached capabilities of the homeserver, returning cached ones if available.
|
2113
|
-
* If there are no cached capabilities and none can be fetched, throw an exception.
|
2114
|
-
*
|
2115
|
-
* @returns Promise resolving with The capabilities of the homeserver
|
2116
|
-
*/
|
2117
|
-
public async getCapabilities(): Promise<Capabilities> {
|
2118
|
-
const caps = this.serverCapabilitiesService.getCachedCapabilities();
|
2119
|
-
if (caps) return caps;
|
2120
|
-
return this.serverCapabilitiesService.fetchCapabilities();
|
2121
|
-
}
|
2122
|
-
|
2123
|
-
/**
|
2124
|
-
* Gets the cached capabilities of the homeserver. If none have been fetched yet,
|
2125
|
-
* return undefined.
|
2126
|
-
*
|
2127
|
-
* @returns The capabilities of the homeserver
|
2128
|
-
*/
|
2129
|
-
public getCachedCapabilities(): Capabilities | undefined {
|
2130
|
-
return this.serverCapabilitiesService.getCachedCapabilities();
|
2131
|
-
}
|
2132
|
-
|
2133
|
-
/**
|
2134
|
-
* Fetches the latest capabilities from the homeserver, ignoring any cached
|
2135
|
-
* versions. The newly returned version is cached.
|
2136
|
-
*
|
2137
|
-
* @returns A promise which resolves to the capabilities of the homeserver
|
2138
|
-
*/
|
2139
|
-
public fetchCapabilities(): Promise<Capabilities> {
|
2140
|
-
return this.serverCapabilitiesService.fetchCapabilities();
|
2141
|
-
}
|
2142
|
-
|
2143
|
-
/**
|
2144
|
-
* Initialise support for end-to-end encryption in this client, using libolm.
|
2145
|
-
*
|
2146
|
-
* You should call this method after creating the matrixclient, but *before*
|
2147
|
-
* calling `startClient`, if you want to support end-to-end encryption.
|
2148
|
-
*
|
2149
|
-
* It will return a Promise which will resolve when the crypto layer has been
|
2150
|
-
* successfully initialised.
|
2151
|
-
*
|
2152
|
-
* @deprecated libolm is deprecated. Prefer {@link initRustCrypto}.
|
2153
|
-
*/
|
2154
|
-
public async initCrypto(): Promise<void> {
|
2155
|
-
if (!isCryptoAvailable()) {
|
2156
|
-
throw new Error(
|
2157
|
-
`End-to-end encryption not supported in this js-sdk build: did ` +
|
2158
|
-
`you remember to load the olm library?`,
|
2159
|
-
);
|
2160
|
-
}
|
2161
|
-
|
2162
|
-
if (this.cryptoBackend) {
|
2163
|
-
this.logger.warn("Attempt to re-initialise e2e encryption on MatrixClient");
|
2164
|
-
return;
|
2165
|
-
}
|
2166
|
-
|
2167
|
-
if (!this.cryptoStore) {
|
2168
|
-
// the cryptostore is provided by sdk.createClient, so this shouldn't happen
|
2169
|
-
throw new Error(`Cannot enable encryption: no cryptoStore provided`);
|
2170
|
-
}
|
2171
|
-
|
2172
|
-
this.logger.debug("Crypto: Starting up crypto store...");
|
2173
|
-
await this.cryptoStore.startup();
|
2174
|
-
|
2175
|
-
const userId = this.getUserId();
|
2176
|
-
if (userId === null) {
|
2177
|
-
throw new Error(
|
2178
|
-
`Cannot enable encryption on MatrixClient with unknown userId: ` +
|
2179
|
-
`ensure userId is passed in createClient().`,
|
2180
|
-
);
|
2181
|
-
}
|
2182
|
-
if (this.deviceId === null) {
|
2183
|
-
throw new Error(
|
2184
|
-
`Cannot enable encryption on MatrixClient with unknown deviceId: ` +
|
2185
|
-
`ensure deviceId is passed in createClient().`,
|
2186
|
-
);
|
2187
|
-
}
|
2188
|
-
|
2189
|
-
const crypto = new Crypto(this, userId, this.deviceId, this.store, this.cryptoStore, this.verificationMethods!);
|
2190
|
-
|
2191
|
-
this.reEmitter.reEmit(crypto, [
|
2192
|
-
LegacyCryptoEvent.KeyBackupFailed,
|
2193
|
-
LegacyCryptoEvent.KeyBackupSessionsRemaining,
|
2194
|
-
LegacyCryptoEvent.RoomKeyRequest,
|
2195
|
-
LegacyCryptoEvent.RoomKeyRequestCancellation,
|
2196
|
-
LegacyCryptoEvent.Warning,
|
2197
|
-
LegacyCryptoEvent.DevicesUpdated,
|
2198
|
-
LegacyCryptoEvent.WillUpdateDevices,
|
2199
|
-
LegacyCryptoEvent.DeviceVerificationChanged,
|
2200
|
-
LegacyCryptoEvent.UserTrustStatusChanged,
|
2201
|
-
LegacyCryptoEvent.KeysChanged,
|
2202
|
-
]);
|
2203
|
-
|
2204
|
-
this.logger.debug("Crypto: initialising crypto object...");
|
2205
|
-
await crypto.init({
|
2206
|
-
exportedOlmDevice: this.exportedOlmDeviceToImport,
|
2207
|
-
pickleKey: this.pickleKey,
|
2208
|
-
});
|
2209
|
-
delete this.exportedOlmDeviceToImport;
|
2210
|
-
|
2211
|
-
this.olmVersion = Crypto.getOlmVersion();
|
2212
|
-
|
2213
|
-
// if crypto initialisation was successful, tell it to attach its event handlers.
|
2214
|
-
crypto.registerEventHandlers(this as Parameters<Crypto["registerEventHandlers"]>[0]);
|
2215
|
-
this.cryptoBackend = this.crypto = crypto;
|
2216
|
-
|
2217
|
-
// upload our keys in the background
|
2218
|
-
this.crypto.uploadDeviceKeys().catch((e) => {
|
2219
|
-
// TODO: throwing away this error is a really bad idea.
|
2220
|
-
this.logger.error("Error uploading device keys", e);
|
2221
|
-
});
|
2222
|
-
}
|
2223
|
-
|
2224
|
-
/**
|
2225
|
-
* Initialise support for end-to-end encryption in this client, using the rust matrix-sdk-crypto.
|
2226
|
-
*
|
2227
|
-
* An alternative to {@link initCrypto}.
|
2228
|
-
*
|
2229
|
-
* @param args.useIndexedDB - True to use an indexeddb store, false to use an in-memory store. Defaults to 'true'.
|
2230
|
-
* @param args.storageKey - A key with which to encrypt the indexeddb store. If provided, it must be exactly
|
2231
|
-
* 32 bytes of data, and must be the same each time the client is initialised for a given device.
|
2232
|
-
* If both this and `storagePassword` are unspecified, the store will be unencrypted.
|
2233
|
-
* @param args.storagePassword - An alternative to `storageKey`. A password which will be used to derive a key to
|
2234
|
-
* encrypt the store with. Deriving a key from a password is (deliberately) a slow operation, so prefer
|
2235
|
-
* to pass a `storageKey` directly where possible.
|
2236
|
-
*
|
2237
|
-
* @returns a Promise which will resolve when the crypto layer has been
|
2238
|
-
* successfully initialised.
|
2239
|
-
*/
|
2240
|
-
public async initRustCrypto(
|
2241
|
-
args: {
|
2242
|
-
useIndexedDB?: boolean;
|
2243
|
-
storageKey?: Uint8Array;
|
2244
|
-
storagePassword?: string;
|
2245
|
-
} = {},
|
2246
|
-
): Promise<void> {
|
2247
|
-
if (this.cryptoBackend) {
|
2248
|
-
this.logger.warn("Attempt to re-initialise e2e encryption on MatrixClient");
|
2249
|
-
return;
|
2250
|
-
}
|
2251
|
-
|
2252
|
-
const userId = this.getUserId();
|
2253
|
-
if (userId === null) {
|
2254
|
-
throw new Error(
|
2255
|
-
`Cannot enable encryption on MatrixClient with unknown userId: ` +
|
2256
|
-
`ensure userId is passed in createClient().`,
|
2257
|
-
);
|
2258
|
-
}
|
2259
|
-
const deviceId = this.getDeviceId();
|
2260
|
-
if (deviceId === null) {
|
2261
|
-
throw new Error(
|
2262
|
-
`Cannot enable encryption on MatrixClient with unknown deviceId: ` +
|
2263
|
-
`ensure deviceId is passed in createClient().`,
|
2264
|
-
);
|
2265
|
-
}
|
2266
|
-
|
2267
|
-
// importing rust-crypto will download the webassembly, so we delay it until we know it will be
|
2268
|
-
// needed.
|
2269
|
-
this.logger.debug("Downloading Rust crypto library");
|
2270
|
-
const RustCrypto = await import("./rust-crypto/index.ts");
|
2271
|
-
|
2272
|
-
const rustCrypto = await RustCrypto.initRustCrypto({
|
2273
|
-
logger: this.logger,
|
2274
|
-
http: this.http,
|
2275
|
-
userId: userId,
|
2276
|
-
deviceId: deviceId,
|
2277
|
-
secretStorage: this.secretStorage,
|
2278
|
-
cryptoCallbacks: this.cryptoCallbacks,
|
2279
|
-
storePrefix: args.useIndexedDB === false ? null : RUST_SDK_STORE_PREFIX,
|
2280
|
-
storeKey: args.storageKey,
|
2281
|
-
storePassphrase: args.storagePassword,
|
2282
|
-
|
2283
|
-
legacyCryptoStore: this.cryptoStore,
|
2284
|
-
legacyPickleKey: this.pickleKey ?? "DEFAULT_KEY",
|
2285
|
-
legacyMigrationProgressListener: (progress: number, total: number): void => {
|
2286
|
-
this.emit(CryptoEvent.LegacyCryptoStoreMigrationProgress, progress, total);
|
2287
|
-
},
|
2288
|
-
});
|
2289
|
-
|
2290
|
-
rustCrypto.setSupportedVerificationMethods(this.verificationMethods);
|
2291
|
-
|
2292
|
-
this.cryptoBackend = rustCrypto;
|
2293
|
-
|
2294
|
-
// attach the event listeners needed by RustCrypto
|
2295
|
-
this.on(RoomMemberEvent.Membership, rustCrypto.onRoomMembership.bind(rustCrypto));
|
2296
|
-
this.on(ClientEvent.Event, (event) => {
|
2297
|
-
rustCrypto.onLiveEventFromSync(event);
|
2298
|
-
});
|
2299
|
-
|
2300
|
-
// re-emit the events emitted by the crypto impl
|
2301
|
-
this.reEmitter.reEmit(rustCrypto, [
|
2302
|
-
CryptoEvent.VerificationRequestReceived,
|
2303
|
-
CryptoEvent.UserTrustStatusChanged,
|
2304
|
-
CryptoEvent.KeyBackupStatus,
|
2305
|
-
CryptoEvent.KeyBackupSessionsRemaining,
|
2306
|
-
CryptoEvent.KeyBackupFailed,
|
2307
|
-
CryptoEvent.KeyBackupDecryptionKeyCached,
|
2308
|
-
CryptoEvent.KeysChanged,
|
2309
|
-
CryptoEvent.DevicesUpdated,
|
2310
|
-
CryptoEvent.WillUpdateDevices,
|
2311
|
-
]);
|
2312
|
-
}
|
2313
|
-
|
2314
|
-
/**
|
2315
|
-
* Access the server-side secret storage API for this client.
|
2316
|
-
*/
|
2317
|
-
public get secretStorage(): ServerSideSecretStorage {
|
2318
|
-
return this._secretStorage;
|
2319
|
-
}
|
2320
|
-
|
2321
|
-
/**
|
2322
|
-
* Access the crypto API for this client.
|
2323
|
-
*
|
2324
|
-
* If end-to-end encryption has been enabled for this client (via {@link initCrypto} or {@link initRustCrypto}),
|
2325
|
-
* returns an object giving access to the crypto API. Otherwise, returns `undefined`.
|
2326
|
-
*/
|
2327
|
-
public getCrypto(): CryptoApi | undefined {
|
2328
|
-
return this.cryptoBackend;
|
2329
|
-
}
|
2330
|
-
|
2331
|
-
/**
|
2332
|
-
* Is end-to-end crypto enabled for this client.
|
2333
|
-
* @returns True if end-to-end is enabled.
|
2334
|
-
* @deprecated prefer {@link getCrypto}
|
2335
|
-
*/
|
2336
|
-
public isCryptoEnabled(): boolean {
|
2337
|
-
return !!this.cryptoBackend;
|
2338
|
-
}
|
2339
|
-
|
2340
|
-
/**
|
2341
|
-
* Get the Ed25519 key for this device
|
2342
|
-
*
|
2343
|
-
* @returns base64-encoded ed25519 key. Null if crypto is
|
2344
|
-
* disabled.
|
2345
|
-
*
|
2346
|
-
* @deprecated Not supported for Rust Cryptography.Prefer {@link CryptoApi.getOwnDeviceKeys}
|
2347
|
-
*/
|
2348
|
-
public getDeviceEd25519Key(): string | null {
|
2349
|
-
return this.crypto?.getDeviceEd25519Key() ?? null;
|
2350
|
-
}
|
2351
|
-
|
2352
|
-
/**
|
2353
|
-
* Get the Curve25519 key for this device
|
2354
|
-
*
|
2355
|
-
* @returns base64-encoded curve25519 key. Null if crypto is
|
2356
|
-
* disabled.
|
2357
|
-
*
|
2358
|
-
* @deprecated Not supported for Rust Cryptography. Use {@link CryptoApi.getOwnDeviceKeys}
|
2359
|
-
*/
|
2360
|
-
public getDeviceCurve25519Key(): string | null {
|
2361
|
-
return this.crypto?.getDeviceCurve25519Key() ?? null;
|
2362
|
-
}
|
2363
|
-
|
2364
|
-
/**
|
2365
|
-
* @deprecated Does nothing.
|
2366
|
-
*/
|
2367
|
-
public async uploadKeys(): Promise<void> {
|
2368
|
-
this.logger.warn("MatrixClient.uploadKeys is deprecated");
|
2369
|
-
}
|
2370
|
-
|
2371
|
-
/**
|
2372
|
-
* Download the keys for a list of users and stores the keys in the session
|
2373
|
-
* store.
|
2374
|
-
* @param userIds - The users to fetch.
|
2375
|
-
* @param forceDownload - Always download the keys even if cached.
|
2376
|
-
*
|
2377
|
-
* @returns A promise which resolves to a map userId-\>deviceId-\>`DeviceInfo`
|
2378
|
-
*
|
2379
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
|
2380
|
-
*/
|
2381
|
-
public downloadKeys(userIds: string[], forceDownload?: boolean): Promise<DeviceInfoMap> {
|
2382
|
-
if (!this.crypto) {
|
2383
|
-
return Promise.reject(new Error("End-to-end encryption disabled"));
|
2384
|
-
}
|
2385
|
-
return this.crypto.downloadKeys(userIds, forceDownload);
|
2386
|
-
}
|
2387
|
-
|
2388
|
-
/**
|
2389
|
-
* Get the stored device keys for a user id
|
2390
|
-
*
|
2391
|
-
* @param userId - the user to list keys for.
|
2392
|
-
*
|
2393
|
-
* @returns list of devices
|
2394
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
|
2395
|
-
*/
|
2396
|
-
public getStoredDevicesForUser(userId: string): DeviceInfo[] {
|
2397
|
-
if (!this.crypto) {
|
2398
|
-
throw new Error("End-to-end encryption disabled");
|
2399
|
-
}
|
2400
|
-
return this.crypto.getStoredDevicesForUser(userId) || [];
|
2401
|
-
}
|
2402
|
-
|
2403
|
-
/**
|
2404
|
-
* Get the stored device key for a user id and device id
|
2405
|
-
*
|
2406
|
-
* @param userId - the user to list keys for.
|
2407
|
-
* @param deviceId - unique identifier for the device
|
2408
|
-
*
|
2409
|
-
* @returns device or null
|
2410
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
|
2411
|
-
*/
|
2412
|
-
public getStoredDevice(userId: string, deviceId: string): DeviceInfo | null {
|
2413
|
-
if (!this.crypto) {
|
2414
|
-
throw new Error("End-to-end encryption disabled");
|
2415
|
-
}
|
2416
|
-
return this.crypto.getStoredDevice(userId, deviceId) || null;
|
2417
|
-
}
|
2418
|
-
|
2419
|
-
/**
|
2420
|
-
* Mark the given device as verified
|
2421
|
-
*
|
2422
|
-
* @param userId - owner of the device
|
2423
|
-
* @param deviceId - unique identifier for the device or user's
|
2424
|
-
* cross-signing public key ID.
|
2425
|
-
*
|
2426
|
-
* @param verified - whether to mark the device as verified. defaults
|
2427
|
-
* to 'true'.
|
2428
|
-
*
|
2429
|
-
* @returns
|
2430
|
-
*
|
2431
|
-
* @remarks
|
2432
|
-
* Fires {@link CryptoEvent#DeviceVerificationChanged}
|
2433
|
-
*/
|
2434
|
-
public setDeviceVerified(userId: string, deviceId: string, verified = true): Promise<void> {
|
2435
|
-
const prom = this.setDeviceVerification(userId, deviceId, verified, null, null);
|
2436
|
-
|
2437
|
-
// if one of the user's own devices is being marked as verified / unverified,
|
2438
|
-
// check the key backup status, since whether or not we use this depends on
|
2439
|
-
// whether it has a signature from a verified device
|
2440
|
-
if (userId == this.credentials.userId) {
|
2441
|
-
this.checkKeyBackup();
|
2442
|
-
}
|
2443
|
-
return prom;
|
2444
|
-
}
|
2445
|
-
|
2446
|
-
/**
|
2447
|
-
* Mark the given device as blocked/unblocked
|
2448
|
-
*
|
2449
|
-
* @param userId - owner of the device
|
2450
|
-
* @param deviceId - unique identifier for the device or user's
|
2451
|
-
* cross-signing public key ID.
|
2452
|
-
*
|
2453
|
-
* @param blocked - whether to mark the device as blocked. defaults
|
2454
|
-
* to 'true'.
|
2455
|
-
*
|
2456
|
-
* @returns
|
2457
|
-
*
|
2458
|
-
* @remarks
|
2459
|
-
* Fires {@link LegacyCryptoEvent.DeviceVerificationChanged}
|
2460
|
-
*
|
2461
|
-
* @deprecated Not supported for Rust Cryptography.
|
2462
|
-
*/
|
2463
|
-
public setDeviceBlocked(userId: string, deviceId: string, blocked = true): Promise<void> {
|
2464
|
-
return this.setDeviceVerification(userId, deviceId, null, blocked, null);
|
2465
|
-
}
|
2466
|
-
|
2467
|
-
/**
|
2468
|
-
* Mark the given device as known/unknown
|
2469
|
-
*
|
2470
|
-
* @param userId - owner of the device
|
2471
|
-
* @param deviceId - unique identifier for the device or user's
|
2472
|
-
* cross-signing public key ID.
|
2473
|
-
*
|
2474
|
-
* @param known - whether to mark the device as known. defaults
|
2475
|
-
* to 'true'.
|
2476
|
-
*
|
2477
|
-
* @returns
|
2478
|
-
*
|
2479
|
-
* @remarks
|
2480
|
-
* Fires {@link CryptoEvent#DeviceVerificationChanged}
|
2481
|
-
*
|
2482
|
-
* @deprecated Not supported for Rust Cryptography.
|
2483
|
-
*/
|
2484
|
-
public setDeviceKnown(userId: string, deviceId: string, known = true): Promise<void> {
|
2485
|
-
return this.setDeviceVerification(userId, deviceId, null, null, known);
|
2486
|
-
}
|
2487
|
-
|
2488
|
-
private async setDeviceVerification(
|
2489
|
-
userId: string,
|
2490
|
-
deviceId: string,
|
2491
|
-
verified?: boolean | null,
|
2492
|
-
blocked?: boolean | null,
|
2493
|
-
known?: boolean | null,
|
2494
|
-
): Promise<void> {
|
2495
|
-
if (!this.crypto) {
|
2496
|
-
throw new Error("End-to-end encryption disabled");
|
2497
|
-
}
|
2498
|
-
await this.crypto.setDeviceVerification(userId, deviceId, verified, blocked, known);
|
2499
|
-
}
|
2500
|
-
|
2501
|
-
/**
|
2502
|
-
* Request a key verification from another user, using a DM.
|
2503
|
-
*
|
2504
|
-
* @param userId - the user to request verification with
|
2505
|
-
* @param roomId - the room to use for verification
|
2506
|
-
*
|
2507
|
-
* @returns resolves to a VerificationRequest
|
2508
|
-
* when the request has been sent to the other party.
|
2509
|
-
*
|
2510
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.requestVerificationDM}.
|
2511
|
-
*/
|
2512
|
-
public requestVerificationDM(userId: string, roomId: string): Promise<VerificationRequest> {
|
2513
|
-
if (!this.crypto) {
|
2514
|
-
throw new Error("End-to-end encryption disabled");
|
2515
|
-
}
|
2516
|
-
return this.crypto.requestVerificationDM(userId, roomId);
|
2517
|
-
}
|
2518
|
-
|
2519
|
-
/**
|
2520
|
-
* Finds a DM verification request that is already in progress for the given room id
|
2521
|
-
*
|
2522
|
-
* @param roomId - the room to use for verification
|
2523
|
-
*
|
2524
|
-
* @returns the VerificationRequest that is in progress, if any
|
2525
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.findVerificationRequestDMInProgress}.
|
2526
|
-
*/
|
2527
|
-
public findVerificationRequestDMInProgress(roomId: string): VerificationRequest | undefined {
|
2528
|
-
if (!this.cryptoBackend) {
|
2529
|
-
throw new Error("End-to-end encryption disabled");
|
2530
|
-
} else if (!this.crypto) {
|
2531
|
-
// Hack for element-R to avoid breaking the cypress tests. We can get rid of this once the react-sdk is
|
2532
|
-
// updated to use CryptoApi.findVerificationRequestDMInProgress.
|
2533
|
-
return undefined;
|
2534
|
-
}
|
2535
|
-
return this.crypto.findVerificationRequestDMInProgress(roomId);
|
2536
|
-
}
|
2537
|
-
|
2538
|
-
/**
|
2539
|
-
* Returns all to-device verification requests that are already in progress for the given user id
|
2540
|
-
*
|
2541
|
-
* @param userId - the ID of the user to query
|
2542
|
-
*
|
2543
|
-
* @returns the VerificationRequests that are in progress
|
2544
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getVerificationRequestsToDeviceInProgress}.
|
2545
|
-
*/
|
2546
|
-
public getVerificationRequestsToDeviceInProgress(userId: string): VerificationRequest[] {
|
2547
|
-
if (!this.crypto) {
|
2548
|
-
throw new Error("End-to-end encryption disabled");
|
2549
|
-
}
|
2550
|
-
return this.crypto.getVerificationRequestsToDeviceInProgress(userId);
|
2551
|
-
}
|
2552
|
-
|
2553
|
-
/**
|
2554
|
-
* Request a key verification from another user.
|
2555
|
-
*
|
2556
|
-
* @param userId - the user to request verification with
|
2557
|
-
* @param devices - array of device IDs to send requests to. Defaults to
|
2558
|
-
* all devices owned by the user
|
2559
|
-
*
|
2560
|
-
* @returns resolves to a VerificationRequest
|
2561
|
-
* when the request has been sent to the other party.
|
2562
|
-
*
|
2563
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#requestOwnUserVerification} or {@link CryptoApi#requestDeviceVerification}.
|
2564
|
-
*/
|
2565
|
-
public requestVerification(userId: string, devices?: string[]): Promise<VerificationRequest> {
|
2566
|
-
if (!this.crypto) {
|
2567
|
-
throw new Error("End-to-end encryption disabled");
|
2568
|
-
}
|
2569
|
-
return this.crypto.requestVerification(userId, devices);
|
2570
|
-
}
|
2571
|
-
|
2572
|
-
/**
|
2573
|
-
* Begin a key verification.
|
2574
|
-
*
|
2575
|
-
* @param method - the verification method to use
|
2576
|
-
* @param userId - the user to verify keys with
|
2577
|
-
* @param deviceId - the device to verify
|
2578
|
-
*
|
2579
|
-
* @returns a verification object
|
2580
|
-
* @deprecated Prefer {@link CryptoApi#requestOwnUserVerification} or {@link CryptoApi#requestDeviceVerification}.
|
2581
|
-
*/
|
2582
|
-
public beginKeyVerification(method: string, userId: string, deviceId: string): Verification<any, any> {
|
2583
|
-
if (!this.crypto) {
|
2584
|
-
throw new Error("End-to-end encryption disabled");
|
2585
|
-
}
|
2586
|
-
return this.crypto.beginKeyVerification(method, userId, deviceId);
|
2587
|
-
}
|
2588
|
-
|
2589
|
-
/**
|
2590
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#checkKey}.
|
2591
|
-
*/
|
2592
|
-
public checkSecretStorageKey(key: Uint8Array, info: SecretStorageKeyDescription): Promise<boolean> {
|
2593
|
-
return this.secretStorage.checkKey(key, info);
|
2594
|
-
}
|
2595
|
-
|
2596
|
-
/**
|
2597
|
-
* Set the global override for whether the client should ever send encrypted
|
2598
|
-
* messages to unverified devices. This provides the default for rooms which
|
2599
|
-
* do not specify a value.
|
2600
|
-
*
|
2601
|
-
* @param value - whether to blacklist all unverified devices by default
|
2602
|
-
*
|
2603
|
-
* @deprecated Prefer direct access to {@link CryptoApi.globalBlacklistUnverifiedDevices}:
|
2604
|
-
*
|
2605
|
-
* ```javascript
|
2606
|
-
* client.getCrypto().globalBlacklistUnverifiedDevices = value;
|
2607
|
-
* ```
|
2608
|
-
*/
|
2609
|
-
public setGlobalBlacklistUnverifiedDevices(value: boolean): boolean {
|
2610
|
-
if (!this.cryptoBackend) {
|
2611
|
-
throw new Error("End-to-end encryption disabled");
|
2612
|
-
}
|
2613
|
-
this.cryptoBackend.globalBlacklistUnverifiedDevices = value;
|
2614
|
-
return value;
|
2615
|
-
}
|
2616
|
-
|
2617
|
-
/**
|
2618
|
-
* @returns whether to blacklist all unverified devices by default
|
2619
|
-
*
|
2620
|
-
* @deprecated Prefer direct access to {@link CryptoApi.globalBlacklistUnverifiedDevices}:
|
2621
|
-
*
|
2622
|
-
* ```javascript
|
2623
|
-
* value = client.getCrypto().globalBlacklistUnverifiedDevices;
|
2624
|
-
* ```
|
2625
|
-
*/
|
2626
|
-
public getGlobalBlacklistUnverifiedDevices(): boolean {
|
2627
|
-
if (!this.cryptoBackend) {
|
2628
|
-
throw new Error("End-to-end encryption disabled");
|
2629
|
-
}
|
2630
|
-
return this.cryptoBackend.globalBlacklistUnverifiedDevices;
|
2631
|
-
}
|
2632
|
-
|
2633
|
-
/**
|
2634
|
-
* Set whether sendMessage in a room with unknown and unverified devices
|
2635
|
-
* should throw an error and not send them message. This has 'Global' for
|
2636
|
-
* symmetry with setGlobalBlacklistUnverifiedDevices but there is currently
|
2637
|
-
* no room-level equivalent for this setting.
|
2638
|
-
*
|
2639
|
-
* This API is currently UNSTABLE and may change or be removed without notice.
|
2640
|
-
*
|
2641
|
-
* It has no effect with the Rust crypto implementation.
|
2642
|
-
*
|
2643
|
-
* @param value - whether error on unknown devices
|
2644
|
-
*
|
2645
|
-
* ```ts
|
2646
|
-
* client.getCrypto().globalErrorOnUnknownDevices = value;
|
2647
|
-
* ```
|
2648
|
-
*/
|
2649
|
-
public setGlobalErrorOnUnknownDevices(value: boolean): void {
|
2650
|
-
if (!this.cryptoBackend) {
|
2651
|
-
throw new Error("End-to-end encryption disabled");
|
2652
|
-
}
|
2653
|
-
this.cryptoBackend.globalErrorOnUnknownDevices = value;
|
2654
|
-
}
|
2655
|
-
|
2656
|
-
/**
|
2657
|
-
* @returns whether to error on unknown devices
|
2658
|
-
*
|
2659
|
-
* This API is currently UNSTABLE and may change or be removed without notice.
|
2660
|
-
*/
|
2661
|
-
public getGlobalErrorOnUnknownDevices(): boolean {
|
2662
|
-
if (!this.cryptoBackend) {
|
2663
|
-
throw new Error("End-to-end encryption disabled");
|
2664
|
-
}
|
2665
|
-
return this.cryptoBackend.globalErrorOnUnknownDevices;
|
2666
|
-
}
|
2667
|
-
|
2668
|
-
/**
|
2669
|
-
* Get the ID of one of the user's cross-signing keys
|
2670
|
-
*
|
2671
|
-
* @param type - The type of key to get the ID of. One of
|
2672
|
-
* "master", "self_signing", or "user_signing". Defaults to "master".
|
2673
|
-
*
|
2674
|
-
* @returns the key ID
|
2675
|
-
* @deprecated Not supported for Rust Cryptography. prefer {@link Crypto.CryptoApi#getCrossSigningKeyId}
|
2676
|
-
*/
|
2677
|
-
public getCrossSigningId(type: CrossSigningKey | string = CrossSigningKey.Master): string | null {
|
2678
|
-
if (!this.crypto) {
|
2679
|
-
throw new Error("End-to-end encryption disabled");
|
2680
|
-
}
|
2681
|
-
return this.crypto.getCrossSigningId(type);
|
2682
|
-
}
|
2683
|
-
|
2684
|
-
/**
|
2685
|
-
* Get the cross signing information for a given user.
|
2686
|
-
*
|
2687
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
2688
|
-
*
|
2689
|
-
* @param userId - the user ID to get the cross-signing info for.
|
2690
|
-
*
|
2691
|
-
* @returns the cross signing information for the user.
|
2692
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#userHasCrossSigningKeys}
|
2693
|
-
*/
|
2694
|
-
public getStoredCrossSigningForUser(userId: string): CrossSigningInfo | null {
|
2695
|
-
if (!this.cryptoBackend) {
|
2696
|
-
throw new Error("End-to-end encryption disabled");
|
2697
|
-
}
|
2698
|
-
return this.cryptoBackend.getStoredCrossSigningForUser(userId);
|
2699
|
-
}
|
2700
|
-
|
2701
|
-
/**
|
2702
|
-
* Check whether a given user is trusted.
|
2703
|
-
*
|
2704
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
2705
|
-
*
|
2706
|
-
* @param userId - The ID of the user to check.
|
2707
|
-
*
|
2708
|
-
* @deprecated Use {@link Crypto.CryptoApi.getUserVerificationStatus | `CryptoApi.getUserVerificationStatus`}
|
2709
|
-
*/
|
2710
|
-
public checkUserTrust(userId: string): UserTrustLevel {
|
2711
|
-
if (!this.cryptoBackend) {
|
2712
|
-
throw new Error("End-to-end encryption disabled");
|
2713
|
-
}
|
2714
|
-
return this.cryptoBackend.checkUserTrust(userId);
|
2715
|
-
}
|
2716
|
-
|
2717
|
-
/**
|
2718
|
-
* Check whether a given device is trusted.
|
2719
|
-
*
|
2720
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
2721
|
-
*
|
2722
|
-
* @param userId - The ID of the user whose devices is to be checked.
|
2723
|
-
* @param deviceId - The ID of the device to check
|
2724
|
-
*
|
2725
|
-
* @deprecated Use {@link Crypto.CryptoApi.getDeviceVerificationStatus | `CryptoApi.getDeviceVerificationStatus`}
|
2726
|
-
*/
|
2727
|
-
public checkDeviceTrust(userId: string, deviceId: string): DeviceTrustLevel {
|
2728
|
-
if (!this.crypto) {
|
2729
|
-
throw new Error("End-to-end encryption disabled");
|
2730
|
-
}
|
2731
|
-
return this.crypto.checkDeviceTrust(userId, deviceId);
|
2732
|
-
}
|
2733
|
-
|
2734
|
-
/**
|
2735
|
-
* Check whether one of our own devices is cross-signed by our
|
2736
|
-
* user's stored keys, regardless of whether we trust those keys yet.
|
2737
|
-
*
|
2738
|
-
* @param deviceId - The ID of the device to check
|
2739
|
-
*
|
2740
|
-
* @returns true if the device is cross-signed
|
2741
|
-
*
|
2742
|
-
* @deprecated Not supported for Rust Cryptography.
|
2743
|
-
*/
|
2744
|
-
public checkIfOwnDeviceCrossSigned(deviceId: string): boolean {
|
2745
|
-
if (!this.crypto) {
|
2746
|
-
throw new Error("End-to-end encryption disabled");
|
2747
|
-
}
|
2748
|
-
return this.crypto.checkIfOwnDeviceCrossSigned(deviceId);
|
2749
|
-
}
|
2750
|
-
|
2751
|
-
/**
|
2752
|
-
* Check the copy of our cross-signing key that we have in the device list and
|
2753
|
-
* see if we can get the private key. If so, mark it as trusted.
|
2754
|
-
* @param opts - ICheckOwnCrossSigningTrustOpts object
|
2755
|
-
*
|
2756
|
-
* @deprecated Unneeded for the new crypto
|
2757
|
-
*/
|
2758
|
-
public checkOwnCrossSigningTrust(opts?: ICheckOwnCrossSigningTrustOpts): Promise<void> {
|
2759
|
-
if (!this.cryptoBackend) {
|
2760
|
-
throw new Error("End-to-end encryption disabled");
|
2761
|
-
}
|
2762
|
-
return this.cryptoBackend.checkOwnCrossSigningTrust(opts);
|
2763
|
-
}
|
2764
|
-
|
2765
|
-
/**
|
2766
|
-
* Checks that a given cross-signing private key matches a given public key.
|
2767
|
-
* This can be used by the getCrossSigningKey callback to verify that the
|
2768
|
-
* private key it is about to supply is the one that was requested.
|
2769
|
-
* @param privateKey - The private key
|
2770
|
-
* @param expectedPublicKey - The public key
|
2771
|
-
* @returns true if the key matches, otherwise false
|
2772
|
-
*
|
2773
|
-
* @deprecated Not supported for Rust Cryptography.
|
2774
|
-
*/
|
2775
|
-
public checkCrossSigningPrivateKey(privateKey: Uint8Array, expectedPublicKey: string): boolean {
|
2776
|
-
if (!this.crypto) {
|
2777
|
-
throw new Error("End-to-end encryption disabled");
|
2778
|
-
}
|
2779
|
-
return this.crypto.checkCrossSigningPrivateKey(privateKey, expectedPublicKey);
|
2780
|
-
}
|
2781
|
-
|
2782
|
-
/**
|
2783
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#requestDeviceVerification}.
|
2784
|
-
*/
|
2785
|
-
public legacyDeviceVerification(userId: string, deviceId: string, method: string): Promise<VerificationRequest> {
|
2786
|
-
if (!this.crypto) {
|
2787
|
-
throw new Error("End-to-end encryption disabled");
|
2788
|
-
}
|
2789
|
-
return this.crypto.legacyDeviceVerification(userId, deviceId, method);
|
2790
|
-
}
|
2791
|
-
|
2792
|
-
/**
|
2793
|
-
* Perform any background tasks that can be done before a message is ready to
|
2794
|
-
* send, in order to speed up sending of the message.
|
2795
|
-
* @param room - the room the event is in
|
2796
|
-
*
|
2797
|
-
* @deprecated Prefer {@link CryptoApi.prepareToEncrypt | `CryptoApi.prepareToEncrypt`}:
|
2798
|
-
*
|
2799
|
-
* ```javascript
|
2800
|
-
* client.getCrypto().prepareToEncrypt(room);
|
2801
|
-
* ```
|
2802
|
-
*/
|
2803
|
-
public prepareToEncrypt(room: Room): void {
|
2804
|
-
if (!this.cryptoBackend) {
|
2805
|
-
throw new Error("End-to-end encryption disabled");
|
2806
|
-
}
|
2807
|
-
this.cryptoBackend.prepareToEncrypt(room);
|
2808
|
-
}
|
2809
|
-
|
2810
|
-
/**
|
2811
|
-
* Checks if the user has previously published cross-signing keys
|
2812
|
-
*
|
2813
|
-
* This means downloading the devicelist for the user and checking if the list includes
|
2814
|
-
* the cross-signing pseudo-device.
|
2815
|
-
*
|
2816
|
-
* @deprecated Prefer {@link CryptoApi.userHasCrossSigningKeys | `CryptoApi.userHasCrossSigningKeys`}:
|
2817
|
-
*
|
2818
|
-
* ```javascript
|
2819
|
-
* result = client.getCrypto().userHasCrossSigningKeys();
|
2820
|
-
* ```
|
2821
|
-
*/
|
2822
|
-
public userHasCrossSigningKeys(): Promise<boolean> {
|
2823
|
-
if (!this.cryptoBackend) {
|
2824
|
-
throw new Error("End-to-end encryption disabled");
|
2825
|
-
}
|
2826
|
-
return this.cryptoBackend.userHasCrossSigningKeys();
|
2827
|
-
}
|
2828
|
-
|
2829
|
-
/**
|
2830
|
-
* Checks whether cross signing:
|
2831
|
-
* - is enabled on this account and trusted by this device
|
2832
|
-
* - has private keys either cached locally or stored in secret storage
|
2833
|
-
*
|
2834
|
-
* If this function returns false, bootstrapCrossSigning() can be used
|
2835
|
-
* to fix things such that it returns true. That is to say, after
|
2836
|
-
* bootstrapCrossSigning() completes successfully, this function should
|
2837
|
-
* return true.
|
2838
|
-
* @returns True if cross-signing is ready to be used on this device
|
2839
|
-
* @deprecated Prefer {@link CryptoApi.isCrossSigningReady | `CryptoApi.isCrossSigningReady`}:
|
2840
|
-
*/
|
2841
|
-
public isCrossSigningReady(): Promise<boolean> {
|
2842
|
-
if (!this.cryptoBackend) {
|
2843
|
-
throw new Error("End-to-end encryption disabled");
|
2844
|
-
}
|
2845
|
-
return this.cryptoBackend.isCrossSigningReady();
|
2846
|
-
}
|
2847
|
-
|
2848
|
-
/**
|
2849
|
-
* Bootstrap cross-signing by creating keys if needed. If everything is already
|
2850
|
-
* set up, then no changes are made, so this is safe to run to ensure
|
2851
|
-
* cross-signing is ready for use.
|
2852
|
-
*
|
2853
|
-
* This function:
|
2854
|
-
* - creates new cross-signing keys if they are not found locally cached nor in
|
2855
|
-
* secret storage (if it has been set up)
|
2856
|
-
*
|
2857
|
-
* @deprecated Prefer {@link CryptoApi.bootstrapCrossSigning | `CryptoApi.bootstrapCrossSigning`}.
|
2858
|
-
*/
|
2859
|
-
public bootstrapCrossSigning(opts: BootstrapCrossSigningOpts): Promise<void> {
|
2860
|
-
if (!this.cryptoBackend) {
|
2861
|
-
throw new Error("End-to-end encryption disabled");
|
2862
|
-
}
|
2863
|
-
return this.cryptoBackend.bootstrapCrossSigning(opts);
|
2864
|
-
}
|
2865
|
-
|
2866
|
-
/**
|
2867
|
-
* Whether to trust a others users signatures of their devices.
|
2868
|
-
* If false, devices will only be considered 'verified' if we have
|
2869
|
-
* verified that device individually (effectively disabling cross-signing).
|
2870
|
-
*
|
2871
|
-
* Default: true
|
2872
|
-
*
|
2873
|
-
* @returns True if trusting cross-signed devices
|
2874
|
-
*
|
2875
|
-
* @deprecated Prefer {@link CryptoApi.getTrustCrossSignedDevices | `CryptoApi.getTrustCrossSignedDevices`}.
|
2876
|
-
*/
|
2877
|
-
public getCryptoTrustCrossSignedDevices(): boolean {
|
2878
|
-
if (!this.cryptoBackend) {
|
2879
|
-
throw new Error("End-to-end encryption disabled");
|
2880
|
-
}
|
2881
|
-
return this.cryptoBackend.getTrustCrossSignedDevices();
|
2882
|
-
}
|
2883
|
-
|
2884
|
-
/**
|
2885
|
-
* See getCryptoTrustCrossSignedDevices
|
2886
|
-
*
|
2887
|
-
* @param val - True to trust cross-signed devices
|
2888
|
-
*
|
2889
|
-
* @deprecated Prefer {@link CryptoApi.setTrustCrossSignedDevices | `CryptoApi.setTrustCrossSignedDevices`}.
|
2890
|
-
*/
|
2891
|
-
public setCryptoTrustCrossSignedDevices(val: boolean): void {
|
2892
|
-
if (!this.cryptoBackend) {
|
2893
|
-
throw new Error("End-to-end encryption disabled");
|
2894
|
-
}
|
2895
|
-
this.cryptoBackend.setTrustCrossSignedDevices(val);
|
2896
|
-
}
|
2897
|
-
|
2898
|
-
/**
|
2899
|
-
* Counts the number of end to end session keys that are waiting to be backed up
|
2900
|
-
* @returns Promise which resolves to the number of sessions requiring backup
|
2901
|
-
*
|
2902
|
-
* @deprecated Not supported for Rust Cryptography.
|
2903
|
-
*/
|
2904
|
-
public countSessionsNeedingBackup(): Promise<number> {
|
2905
|
-
if (!this.crypto) {
|
2906
|
-
throw new Error("End-to-end encryption disabled");
|
2907
|
-
}
|
2908
|
-
return this.crypto.countSessionsNeedingBackup();
|
2909
|
-
}
|
2910
|
-
|
2911
|
-
/**
|
2912
|
-
* Get information about the encryption of an event
|
2913
|
-
*
|
2914
|
-
* @param event - event to be checked
|
2915
|
-
* @returns The event information.
|
2916
|
-
* @deprecated Prefer {@link Crypto.CryptoApi.getEncryptionInfoForEvent | `CryptoApi.getEncryptionInfoForEvent`}.
|
2917
|
-
*/
|
2918
|
-
public getEventEncryptionInfo(event: MatrixEvent): IEncryptedEventInfo {
|
2919
|
-
if (!this.cryptoBackend) {
|
2920
|
-
throw new Error("End-to-end encryption disabled");
|
2921
|
-
}
|
2922
|
-
return this.cryptoBackend.getEventEncryptionInfo(event);
|
2923
|
-
}
|
2924
|
-
|
2925
|
-
/**
|
2926
|
-
* Create a recovery key from a user-supplied passphrase.
|
2927
|
-
*
|
2928
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
2929
|
-
*
|
2930
|
-
* @param password - Passphrase string that can be entered by the user
|
2931
|
-
* when restoring the backup as an alternative to entering the recovery key.
|
2932
|
-
* Optional.
|
2933
|
-
* @returns Object with public key metadata, encoded private
|
2934
|
-
* recovery key which should be disposed of after displaying to the user,
|
2935
|
-
* and raw private key to avoid round tripping if needed.
|
2936
|
-
*
|
2937
|
-
* @deprecated Prefer {@link CryptoApi.createRecoveryKeyFromPassphrase | `CryptoApi.createRecoveryKeyFromPassphrase`}.
|
2938
|
-
*/
|
2939
|
-
public createRecoveryKeyFromPassphrase(password?: string): Promise<IRecoveryKey> {
|
2940
|
-
if (!this.cryptoBackend) {
|
2941
|
-
throw new Error("End-to-end encryption disabled");
|
2942
|
-
}
|
2943
|
-
return this.cryptoBackend.createRecoveryKeyFromPassphrase(password);
|
2944
|
-
}
|
2945
|
-
|
2946
|
-
/**
|
2947
|
-
* Checks whether secret storage:
|
2948
|
-
* - is enabled on this account
|
2949
|
-
* - is storing cross-signing private keys
|
2950
|
-
* - is storing session backup key (if enabled)
|
2951
|
-
*
|
2952
|
-
* If this function returns false, bootstrapSecretStorage() can be used
|
2953
|
-
* to fix things such that it returns true. That is to say, after
|
2954
|
-
* bootstrapSecretStorage() completes successfully, this function should
|
2955
|
-
* return true.
|
2956
|
-
*
|
2957
|
-
* @returns True if secret storage is ready to be used on this device
|
2958
|
-
* @deprecated Prefer {@link CryptoApi.isSecretStorageReady | `CryptoApi.isSecretStorageReady`}.
|
2959
|
-
*/
|
2960
|
-
public isSecretStorageReady(): Promise<boolean> {
|
2961
|
-
if (!this.cryptoBackend) {
|
2962
|
-
throw new Error("End-to-end encryption disabled");
|
2963
|
-
}
|
2964
|
-
return this.cryptoBackend.isSecretStorageReady();
|
2965
|
-
}
|
2966
|
-
|
2967
|
-
/**
|
2968
|
-
* Bootstrap Secure Secret Storage if needed by creating a default key. If everything is
|
2969
|
-
* already set up, then no changes are made, so this is safe to run to ensure secret
|
2970
|
-
* storage is ready for use.
|
2971
|
-
*
|
2972
|
-
* This function
|
2973
|
-
* - creates a new Secure Secret Storage key if no default key exists
|
2974
|
-
* - if a key backup exists, it is migrated to store the key in the Secret
|
2975
|
-
* Storage
|
2976
|
-
* - creates a backup if none exists, and one is requested
|
2977
|
-
* - migrates Secure Secret Storage to use the latest algorithm, if an outdated
|
2978
|
-
* algorithm is found
|
2979
|
-
*
|
2980
|
-
* @deprecated Use {@link CryptoApi.bootstrapSecretStorage | `CryptoApi.bootstrapSecretStorage`}.
|
2981
|
-
*/
|
2982
|
-
public bootstrapSecretStorage(opts: ICreateSecretStorageOpts): Promise<void> {
|
2983
|
-
if (!this.cryptoBackend) {
|
2984
|
-
throw new Error("End-to-end encryption disabled");
|
2985
|
-
}
|
2986
|
-
return this.cryptoBackend.bootstrapSecretStorage(opts);
|
2987
|
-
}
|
2988
|
-
|
2989
|
-
/**
|
2990
|
-
* Add a key for encrypting secrets.
|
2991
|
-
*
|
2992
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
2993
|
-
*
|
2994
|
-
* @param algorithm - the algorithm used by the key
|
2995
|
-
* @param opts - the options for the algorithm. The properties used
|
2996
|
-
* depend on the algorithm given.
|
2997
|
-
* @param keyName - the name of the key. If not given, a random name will be generated.
|
2998
|
-
*
|
2999
|
-
* @returns An object with:
|
3000
|
-
* keyId: the ID of the key
|
3001
|
-
* keyInfo: details about the key (iv, mac, passphrase)
|
3002
|
-
*
|
3003
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#addKey}.
|
3004
|
-
*/
|
3005
|
-
public addSecretStorageKey(
|
3006
|
-
algorithm: string,
|
3007
|
-
opts: AddSecretStorageKeyOpts,
|
3008
|
-
keyName?: string,
|
3009
|
-
): Promise<{ keyId: string; keyInfo: SecretStorageKeyDescription }> {
|
3010
|
-
return this.secretStorage.addKey(algorithm, opts, keyName);
|
3011
|
-
}
|
3012
|
-
|
3013
|
-
/**
|
3014
|
-
* Check whether we have a key with a given ID.
|
3015
|
-
*
|
3016
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
3017
|
-
*
|
3018
|
-
* @param keyId - The ID of the key to check
|
3019
|
-
* for. Defaults to the default key ID if not provided.
|
3020
|
-
* @returns Whether we have the key.
|
3021
|
-
*
|
3022
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#hasKey}.
|
3023
|
-
*/
|
3024
|
-
public hasSecretStorageKey(keyId?: string): Promise<boolean> {
|
3025
|
-
return this.secretStorage.hasKey(keyId);
|
3026
|
-
}
|
3027
|
-
|
3028
|
-
/**
|
3029
|
-
* Store an encrypted secret on the server.
|
3030
|
-
*
|
3031
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
3032
|
-
*
|
3033
|
-
* @param name - The name of the secret
|
3034
|
-
* @param secret - The secret contents.
|
3035
|
-
* @param keys - The IDs of the keys to use to encrypt the secret or null/undefined
|
3036
|
-
* to use the default (will throw if no default key is set).
|
3037
|
-
*
|
3038
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#store}.
|
3039
|
-
*/
|
3040
|
-
public storeSecret(name: string, secret: string, keys?: string[]): Promise<void> {
|
3041
|
-
return this.secretStorage.store(name, secret, keys);
|
3042
|
-
}
|
3043
|
-
|
3044
|
-
/**
|
3045
|
-
* Get a secret from storage.
|
3046
|
-
*
|
3047
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
3048
|
-
*
|
3049
|
-
* @param name - the name of the secret
|
3050
|
-
*
|
3051
|
-
* @returns the contents of the secret
|
3052
|
-
*
|
3053
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#get}.
|
3054
|
-
*/
|
3055
|
-
public getSecret(name: string): Promise<string | undefined> {
|
3056
|
-
return this.secretStorage.get(name);
|
3057
|
-
}
|
3058
|
-
|
3059
|
-
/**
|
3060
|
-
* Check if a secret is stored on the server.
|
3061
|
-
*
|
3062
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
3063
|
-
*
|
3064
|
-
* @param name - the name of the secret
|
3065
|
-
* @returns map of key name to key info the secret is encrypted
|
3066
|
-
* with, or null if it is not present or not encrypted with a trusted
|
3067
|
-
* key
|
3068
|
-
*
|
3069
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#isStored}.
|
3070
|
-
*/
|
3071
|
-
public isSecretStored(name: string): Promise<Record<string, SecretStorageKeyDescription> | null> {
|
3072
|
-
return this.secretStorage.isStored(name);
|
3073
|
-
}
|
3074
|
-
|
3075
|
-
/**
|
3076
|
-
* Request a secret from another device.
|
3077
|
-
*
|
3078
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
3079
|
-
*
|
3080
|
-
* @param name - the name of the secret to request
|
3081
|
-
* @param devices - the devices to request the secret from
|
3082
|
-
*
|
3083
|
-
* @returns the secret request object
|
3084
|
-
* @deprecated Not supported for Rust Cryptography.
|
3085
|
-
*/
|
3086
|
-
public requestSecret(name: string, devices: string[]): ISecretRequest {
|
3087
|
-
if (!this.crypto) {
|
3088
|
-
throw new Error("End-to-end encryption disabled");
|
3089
|
-
}
|
3090
|
-
return this.crypto.requestSecret(name, devices);
|
3091
|
-
}
|
3092
|
-
|
3093
|
-
/**
|
3094
|
-
* Get the current default key ID for encrypting secrets.
|
3095
|
-
*
|
3096
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
3097
|
-
*
|
3098
|
-
* @returns The default key ID or null if no default key ID is set
|
3099
|
-
*
|
3100
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#getDefaultKeyId}.
|
3101
|
-
*/
|
3102
|
-
public getDefaultSecretStorageKeyId(): Promise<string | null> {
|
3103
|
-
return this.secretStorage.getDefaultKeyId();
|
3104
|
-
}
|
3105
|
-
|
3106
|
-
/**
|
3107
|
-
* Set the current default key ID for encrypting secrets.
|
3108
|
-
*
|
3109
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
3110
|
-
*
|
3111
|
-
* @param keyId - The new default key ID
|
3112
|
-
*
|
3113
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#setDefaultKeyId}.
|
3114
|
-
*/
|
3115
|
-
public setDefaultSecretStorageKeyId(keyId: string): Promise<void> {
|
3116
|
-
return this.secretStorage.setDefaultKeyId(keyId);
|
3117
|
-
}
|
3118
|
-
|
3119
|
-
/**
|
3120
|
-
* Checks that a given secret storage private key matches a given public key.
|
3121
|
-
* This can be used by the getSecretStorageKey callback to verify that the
|
3122
|
-
* private key it is about to supply is the one that was requested.
|
3123
|
-
*
|
3124
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
3125
|
-
*
|
3126
|
-
* @param privateKey - The private key
|
3127
|
-
* @param expectedPublicKey - The public key
|
3128
|
-
* @returns true if the key matches, otherwise false
|
3129
|
-
*
|
3130
|
-
* @deprecated The use of asymmetric keys for SSSS is deprecated.
|
3131
|
-
* Use {@link SecretStorage.ServerSideSecretStorage#checkKey} for symmetric keys.
|
3132
|
-
*/
|
3133
|
-
public checkSecretStoragePrivateKey(privateKey: Uint8Array, expectedPublicKey: string): boolean {
|
3134
|
-
if (!this.crypto) {
|
3135
|
-
throw new Error("End-to-end encryption disabled");
|
3136
|
-
}
|
3137
|
-
return this.crypto.checkSecretStoragePrivateKey(privateKey, expectedPublicKey);
|
3138
|
-
}
|
3139
|
-
|
3140
|
-
/**
|
3141
|
-
* Get e2e information on the device that sent an event
|
3142
|
-
*
|
3143
|
-
* @param event - event to be checked
|
3144
|
-
* @deprecated Not supported for Rust Cryptography.
|
3145
|
-
*/
|
3146
|
-
public async getEventSenderDeviceInfo(event: MatrixEvent): Promise<DeviceInfo | null> {
|
3147
|
-
if (!this.crypto) {
|
3148
|
-
return null;
|
3149
|
-
}
|
3150
|
-
return this.crypto.getEventSenderDeviceInfo(event);
|
3151
|
-
}
|
3152
|
-
|
3153
|
-
/**
|
3154
|
-
* Check if the sender of an event is verified
|
3155
|
-
*
|
3156
|
-
* @param event - event to be checked
|
3157
|
-
*
|
3158
|
-
* @returns true if the sender of this event has been verified using
|
3159
|
-
* {@link MatrixClient#setDeviceVerified}.
|
3160
|
-
*
|
3161
|
-
* @deprecated Not supported for Rust Cryptography.
|
3162
|
-
*/
|
3163
|
-
public async isEventSenderVerified(event: MatrixEvent): Promise<boolean> {
|
3164
|
-
const device = await this.getEventSenderDeviceInfo(event);
|
3165
|
-
if (!device) {
|
3166
|
-
return false;
|
3167
|
-
}
|
3168
|
-
return device.isVerified();
|
3169
|
-
}
|
3170
|
-
|
3171
|
-
/**
|
3172
|
-
* Get outgoing room key request for this event if there is one.
|
3173
|
-
* @param event - The event to check for
|
3174
|
-
*
|
3175
|
-
* @returns A room key request, or null if there is none
|
3176
|
-
*
|
3177
|
-
* @deprecated Not supported for Rust Cryptography.
|
3178
|
-
*/
|
3179
|
-
public getOutgoingRoomKeyRequest(event: MatrixEvent): Promise<OutgoingRoomKeyRequest | null> {
|
3180
|
-
if (!this.crypto) {
|
3181
|
-
throw new Error("End-to-End encryption disabled");
|
3182
|
-
}
|
3183
|
-
const wireContent = event.getWireContent();
|
3184
|
-
const requestBody: IRoomKeyRequestBody = {
|
3185
|
-
session_id: wireContent.session_id,
|
3186
|
-
sender_key: wireContent.sender_key,
|
3187
|
-
algorithm: wireContent.algorithm,
|
3188
|
-
room_id: event.getRoomId()!,
|
3189
|
-
};
|
3190
|
-
if (!requestBody.session_id || !requestBody.sender_key || !requestBody.algorithm || !requestBody.room_id) {
|
3191
|
-
return Promise.resolve(null);
|
3192
|
-
}
|
3193
|
-
return this.crypto.cryptoStore.getOutgoingRoomKeyRequest(requestBody);
|
3194
|
-
}
|
3195
|
-
|
3196
|
-
/**
|
3197
|
-
* Cancel a room key request for this event if one is ongoing and resend the
|
3198
|
-
* request.
|
3199
|
-
* @param event - event of which to cancel and resend the room
|
3200
|
-
* key request.
|
3201
|
-
* @returns A promise that will resolve when the key request is queued
|
3202
|
-
*
|
3203
|
-
* @deprecated Not supported for Rust Cryptography.
|
3204
|
-
*/
|
3205
|
-
public cancelAndResendEventRoomKeyRequest(event: MatrixEvent): Promise<void> {
|
3206
|
-
if (!this.crypto) {
|
3207
|
-
throw new Error("End-to-End encryption disabled");
|
3208
|
-
}
|
3209
|
-
return event.cancelAndResendKeyRequest(this.crypto, this.getUserId()!);
|
3210
|
-
}
|
3211
|
-
|
3212
|
-
/**
|
3213
|
-
* Enable end-to-end encryption for a room. This does not modify room state.
|
3214
|
-
* Any messages sent before the returned promise resolves will be sent unencrypted.
|
3215
|
-
* @param roomId - The room ID to enable encryption in.
|
3216
|
-
* @param config - The encryption config for the room.
|
3217
|
-
* @returns A promise that will resolve when encryption is set up.
|
3218
|
-
*
|
3219
|
-
* @deprecated Not supported for Rust Cryptography. To enable encryption in a room, send an `m.room.encryption`
|
3220
|
-
* state event.
|
3221
|
-
*/
|
3222
|
-
public setRoomEncryption(roomId: string, config: IRoomEncryption): Promise<void> {
|
3223
|
-
if (!this.crypto) {
|
3224
|
-
throw new Error("End-to-End encryption disabled");
|
3225
|
-
}
|
3226
|
-
return this.crypto.setRoomEncryption(roomId, config);
|
3227
|
-
}
|
3228
|
-
|
3229
|
-
/**
|
3230
|
-
* Whether encryption is enabled for a room.
|
3231
|
-
* @param roomId - the room id to query.
|
3232
|
-
* @returns whether encryption is enabled.
|
3233
|
-
*
|
3234
|
-
* @deprecated Not correctly supported for Rust Cryptography. Use {@link CryptoApi.isEncryptionEnabledInRoom} and/or
|
3235
|
-
* {@link Room.hasEncryptionStateEvent}.
|
3236
|
-
*/
|
3237
|
-
public isRoomEncrypted(roomId: string): boolean {
|
3238
|
-
const room = this.getRoom(roomId);
|
3239
|
-
if (!room) {
|
3240
|
-
// we don't know about this room, so can't determine if it should be
|
3241
|
-
// encrypted. Let's assume not.
|
3242
|
-
return false;
|
3243
|
-
}
|
3244
|
-
|
3245
|
-
// if there is an 'm.room.encryption' event in this room, it should be
|
3246
|
-
// encrypted (independently of whether we actually support encryption)
|
3247
|
-
if (room.hasEncryptionStateEvent()) {
|
3248
|
-
return true;
|
3249
|
-
}
|
3250
|
-
|
3251
|
-
// we don't have an m.room.encrypted event, but that might be because
|
3252
|
-
// the server is hiding it from us. Check the store to see if it was
|
3253
|
-
// previously encrypted.
|
3254
|
-
return this.crypto?.isRoomEncrypted(roomId) ?? false;
|
3255
|
-
}
|
3256
|
-
|
3257
|
-
/**
|
3258
|
-
* Encrypts and sends a given object via Olm to-device messages to a given
|
3259
|
-
* set of devices.
|
3260
|
-
*
|
3261
|
-
* @param userDeviceInfoArr - list of deviceInfo objects representing the devices to send to
|
3262
|
-
*
|
3263
|
-
* @param payload - fields to include in the encrypted payload
|
3264
|
-
*
|
3265
|
-
* @returns Promise which
|
3266
|
-
* resolves once the message has been encrypted and sent to the given
|
3267
|
-
* userDeviceMap, and returns the `{ contentMap, deviceInfoByDeviceId }`
|
3268
|
-
* of the successfully sent messages.
|
3269
|
-
*
|
3270
|
-
* @deprecated Instead use {@link CryptoApi.encryptToDeviceMessages} followed by {@link queueToDevice}.
|
3271
|
-
*/
|
3272
|
-
public encryptAndSendToDevices(userDeviceInfoArr: IOlmDevice<DeviceInfo>[], payload: object): Promise<void> {
|
3273
|
-
if (!this.crypto) {
|
3274
|
-
throw new Error("End-to-End encryption disabled");
|
3275
|
-
}
|
3276
|
-
return this.crypto.encryptAndSendToDevices(userDeviceInfoArr, payload);
|
3277
|
-
}
|
3278
|
-
|
3279
|
-
/**
|
3280
|
-
* Forces the current outbound group session to be discarded such
|
3281
|
-
* that another one will be created next time an event is sent.
|
3282
|
-
*
|
3283
|
-
* @param roomId - The ID of the room to discard the session for
|
3284
|
-
*
|
3285
|
-
* @deprecated Prefer {@link CryptoApi.forceDiscardSession | `CryptoApi.forceDiscardSession`}:
|
3286
|
-
*/
|
3287
|
-
public forceDiscardSession(roomId: string): void {
|
3288
|
-
if (!this.cryptoBackend) {
|
3289
|
-
throw new Error("End-to-End encryption disabled");
|
3290
|
-
}
|
3291
|
-
this.cryptoBackend.forceDiscardSession(roomId);
|
3292
|
-
}
|
3293
|
-
|
3294
|
-
/**
|
3295
|
-
* Get a list containing all of the room keys
|
3296
|
-
*
|
3297
|
-
* This should be encrypted before returning it to the user.
|
3298
|
-
*
|
3299
|
-
* @returns a promise which resolves to a list of session export objects
|
3300
|
-
*
|
3301
|
-
* @deprecated Prefer {@link CryptoApi.exportRoomKeys | `CryptoApi.exportRoomKeys`}:
|
3302
|
-
*
|
3303
|
-
* ```javascript
|
3304
|
-
* sessionData = await client.getCrypto().exportRoomKeys();
|
3305
|
-
* ```
|
3306
|
-
*/
|
3307
|
-
public exportRoomKeys(): Promise<IMegolmSessionData[]> {
|
3308
|
-
if (!this.cryptoBackend) {
|
3309
|
-
return Promise.reject(new Error("End-to-end encryption disabled"));
|
3310
|
-
}
|
3311
|
-
return this.cryptoBackend.exportRoomKeys();
|
3312
|
-
}
|
3313
|
-
|
3314
|
-
/**
|
3315
|
-
* Import a list of room keys previously exported by exportRoomKeys
|
3316
|
-
*
|
3317
|
-
* @param keys - a list of session export objects
|
3318
|
-
* @param opts - options object
|
3319
|
-
*
|
3320
|
-
* @returns a promise which resolves when the keys have been imported
|
3321
|
-
*
|
3322
|
-
* @deprecated Prefer {@link CryptoApi.importRoomKeys | `CryptoApi.importRoomKeys`}:
|
3323
|
-
* ```javascript
|
3324
|
-
* await client.getCrypto()?.importRoomKeys([..]);
|
3325
|
-
* ```
|
3326
|
-
*/
|
3327
|
-
public importRoomKeys(keys: IMegolmSessionData[], opts?: ImportRoomKeysOpts): Promise<void> {
|
3328
|
-
if (!this.cryptoBackend) {
|
3329
|
-
throw new Error("End-to-end encryption disabled");
|
3330
|
-
}
|
3331
|
-
return this.cryptoBackend.importRoomKeys(keys, opts);
|
3332
|
-
}
|
3333
|
-
|
3334
|
-
/**
|
3335
|
-
* Force a re-check of the local key backup status against
|
3336
|
-
* what's on the server.
|
3337
|
-
*
|
3338
|
-
* @returns Object with backup info (as returned by
|
3339
|
-
* getKeyBackupVersion) in backupInfo and
|
3340
|
-
* trust information (as returned by isKeyBackupTrusted)
|
3341
|
-
* in trustInfo.
|
3342
|
-
*
|
3343
|
-
* @deprecated Prefer {@link Crypto.CryptoApi.checkKeyBackupAndEnable}.
|
3344
|
-
*/
|
3345
|
-
public checkKeyBackup(): Promise<IKeyBackupCheck | null> {
|
3346
|
-
if (!this.crypto) {
|
3347
|
-
throw new Error("End-to-end encryption disabled");
|
3348
|
-
}
|
3349
|
-
return this.crypto.backupManager.checkKeyBackup();
|
3350
|
-
}
|
3351
|
-
|
3352
|
-
/**
|
3353
|
-
* Get information about the current key backup from the server.
|
3354
|
-
*
|
3355
|
-
* Performs some basic validity checks on the shape of the result, and raises an error if it is not as expected.
|
3356
|
-
*
|
3357
|
-
* **Note**: there is no (supported) way to distinguish between "failure to talk to the server" and "another client
|
3358
|
-
* uploaded a key backup version using an algorithm I don't understand.
|
3359
|
-
*
|
3360
|
-
* @returns Information object from API, or null if no backup is present on the server.
|
3361
|
-
*
|
3362
|
-
* @deprecated Prefer {@link CryptoApi.getKeyBackupInfo}.
|
3363
|
-
*/
|
3364
|
-
public async getKeyBackupVersion(): Promise<IKeyBackupInfo | null> {
|
3365
|
-
let res: IKeyBackupInfo;
|
3366
|
-
try {
|
3367
|
-
res = await this.http.authedRequest<IKeyBackupInfo>(
|
3368
|
-
Method.Get,
|
3369
|
-
"/room_keys/version",
|
3370
|
-
undefined,
|
3371
|
-
undefined,
|
3372
|
-
{ prefix: ClientPrefix.V3 },
|
3373
|
-
);
|
3374
|
-
} catch (e) {
|
3375
|
-
if ((<MatrixError>e).errcode === "M_NOT_FOUND") {
|
3376
|
-
return null;
|
3377
|
-
} else {
|
3378
|
-
throw e;
|
3379
|
-
}
|
3380
|
-
}
|
3381
|
-
BackupManager.checkBackupVersion(res);
|
3382
|
-
return res;
|
3383
|
-
}
|
3384
|
-
|
3385
|
-
/**
|
3386
|
-
* @param info - key backup info dict from getKeyBackupVersion()
|
3387
|
-
*
|
3388
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.isKeyBackupTrusted | `CryptoApi.isKeyBackupTrusted`}.
|
3389
|
-
*/
|
3390
|
-
public isKeyBackupTrusted(info: IKeyBackupInfo): Promise<TrustInfo> {
|
3391
|
-
if (!this.crypto) {
|
3392
|
-
throw new Error("End-to-end encryption disabled");
|
3393
|
-
}
|
3394
|
-
return this.crypto.backupManager.isKeyBackupTrusted(info);
|
3395
|
-
}
|
3396
|
-
|
3397
|
-
/**
|
3398
|
-
* @returns true if the client is configured to back up keys to
|
3399
|
-
* the server, otherwise false. If we haven't completed a successful check
|
3400
|
-
* of key backup status yet, returns null.
|
3401
|
-
*
|
3402
|
-
* @deprecated Not supported for Rust Cryptography. Prefer direct access to {@link Crypto.CryptoApi.getActiveSessionBackupVersion}:
|
3403
|
-
*
|
3404
|
-
* ```javascript
|
3405
|
-
* let enabled = (await client.getCrypto().getActiveSessionBackupVersion()) !== null;
|
3406
|
-
* ```
|
3407
|
-
*/
|
3408
|
-
public getKeyBackupEnabled(): boolean | null {
|
3409
|
-
if (!this.crypto) {
|
3410
|
-
throw new Error("End-to-end encryption disabled");
|
3411
|
-
}
|
3412
|
-
return this.crypto.backupManager.getKeyBackupEnabled();
|
3413
|
-
}
|
3414
|
-
|
3415
|
-
/**
|
3416
|
-
* Enable backing up of keys, using data previously returned from
|
3417
|
-
* getKeyBackupVersion.
|
3418
|
-
*
|
3419
|
-
* @param info - Backup information object as returned by getKeyBackupVersion
|
3420
|
-
* @returns Promise which resolves when complete.
|
3421
|
-
*
|
3422
|
-
* @deprecated Do not call this directly. Instead call {@link Crypto.CryptoApi.checkKeyBackupAndEnable}.
|
3423
|
-
*/
|
3424
|
-
public enableKeyBackup(info: IKeyBackupInfo): Promise<void> {
|
3425
|
-
if (!this.crypto) {
|
3426
|
-
throw new Error("End-to-end encryption disabled");
|
3427
|
-
}
|
3428
|
-
|
3429
|
-
return this.crypto.backupManager.enableKeyBackup(info);
|
3430
|
-
}
|
3431
|
-
|
3432
|
-
/**
|
3433
|
-
* Disable backing up of keys.
|
3434
|
-
*
|
3435
|
-
* @deprecated Not supported for Rust Cryptography. It should be unnecessary to disable key backup.
|
3436
|
-
*/
|
3437
|
-
public disableKeyBackup(): void {
|
3438
|
-
if (!this.crypto) {
|
3439
|
-
throw new Error("End-to-end encryption disabled");
|
3440
|
-
}
|
3441
|
-
|
3442
|
-
this.crypto.backupManager.disableKeyBackup();
|
3443
|
-
}
|
3444
|
-
|
3445
|
-
/**
|
3446
|
-
* Set up the data required to create a new backup version. The backup version
|
3447
|
-
* will not be created and enabled until createKeyBackupVersion is called.
|
3448
|
-
*
|
3449
|
-
* @param password - Passphrase string that can be entered by the user
|
3450
|
-
* when restoring the backup as an alternative to entering the recovery key.
|
3451
|
-
* Optional.
|
3452
|
-
*
|
3453
|
-
* @returns Object that can be passed to createKeyBackupVersion and
|
3454
|
-
* additionally has a 'recovery_key' member with the user-facing recovery key string.
|
3455
|
-
*
|
3456
|
-
* @deprecated Not supported for Rust cryptography. Use {@link Crypto.CryptoApi.resetKeyBackup | `CryptoApi.resetKeyBackup`}.
|
3457
|
-
*/
|
3458
|
-
public async prepareKeyBackupVersion(
|
3459
|
-
password?: string | Uint8Array | null,
|
3460
|
-
opts: IKeyBackupPrepareOpts = { secureSecretStorage: false },
|
3461
|
-
): Promise<Pick<IPreparedKeyBackupVersion, "algorithm" | "auth_data" | "recovery_key">> {
|
3462
|
-
if (!this.crypto) {
|
3463
|
-
throw new Error("End-to-end encryption disabled");
|
3464
|
-
}
|
3465
|
-
|
3466
|
-
// eslint-disable-next-line camelcase
|
3467
|
-
const { algorithm, auth_data, recovery_key, privateKey } =
|
3468
|
-
await this.crypto.backupManager.prepareKeyBackupVersion(password);
|
3469
|
-
|
3470
|
-
if (opts.secureSecretStorage) {
|
3471
|
-
await this.secretStorage.store("m.megolm_backup.v1", encodeBase64(privateKey));
|
3472
|
-
this.logger.info("Key backup private key stored in secret storage");
|
3473
|
-
}
|
3474
|
-
|
3475
|
-
return {
|
3476
|
-
algorithm,
|
3477
|
-
/* eslint-disable camelcase */
|
3478
|
-
auth_data,
|
3479
|
-
recovery_key,
|
3480
|
-
/* eslint-enable camelcase */
|
3481
|
-
};
|
3482
|
-
}
|
3483
|
-
|
3484
|
-
/**
|
3485
|
-
* Check whether the key backup private key is stored in secret storage.
|
3486
|
-
* @returns map of key name to key info the secret is
|
3487
|
-
* encrypted with, or null if it is not present or not encrypted with a
|
3488
|
-
* trusted key
|
3489
|
-
*/
|
3490
|
-
public isKeyBackupKeyStored(): Promise<Record<string, SecretStorageKeyDescription> | null> {
|
3491
|
-
return Promise.resolve(this.secretStorage.isStored("m.megolm_backup.v1"));
|
3492
|
-
}
|
3493
|
-
|
3494
|
-
/**
|
3495
|
-
* Create a new key backup version and enable it, using the information return
|
3496
|
-
* from prepareKeyBackupVersion.
|
3497
|
-
*
|
3498
|
-
* @param info - Info object from prepareKeyBackupVersion
|
3499
|
-
* @returns Object with 'version' param indicating the version created
|
3500
|
-
*
|
3501
|
-
* @deprecated Use {@link Crypto.CryptoApi.resetKeyBackup | `CryptoApi.resetKeyBackup`}.
|
3502
|
-
*/
|
3503
|
-
public async createKeyBackupVersion(info: IKeyBackupInfo): Promise<IKeyBackupInfo> {
|
3504
|
-
if (!this.crypto) {
|
3505
|
-
throw new Error("End-to-end encryption disabled");
|
3506
|
-
}
|
3507
|
-
|
3508
|
-
await this.crypto.backupManager.createKeyBackupVersion(info);
|
3509
|
-
|
3510
|
-
const data = {
|
3511
|
-
algorithm: info.algorithm,
|
3512
|
-
auth_data: info.auth_data,
|
3513
|
-
};
|
3514
|
-
|
3515
|
-
// Sign the backup auth data with the device key for backwards compat with
|
3516
|
-
// older devices with cross-signing. This can probably go away very soon in
|
3517
|
-
// favour of just signing with the cross-singing master key.
|
3518
|
-
// XXX: Private member access
|
3519
|
-
await this.crypto.signObject(data.auth_data);
|
3520
|
-
|
3521
|
-
if (
|
3522
|
-
this.cryptoCallbacks.getCrossSigningKey &&
|
3523
|
-
// XXX: Private member access
|
3524
|
-
this.crypto.crossSigningInfo.getId()
|
3525
|
-
) {
|
3526
|
-
// now also sign the auth data with the cross-signing master key
|
3527
|
-
// we check for the callback explicitly here because we still want to be able
|
3528
|
-
// to create an un-cross-signed key backup if there is a cross-signing key but
|
3529
|
-
// no callback supplied.
|
3530
|
-
// XXX: Private member access
|
3531
|
-
await this.crypto.crossSigningInfo.signObject(data.auth_data, "master");
|
3532
|
-
}
|
3533
|
-
|
3534
|
-
const res = await this.http.authedRequest<IKeyBackupInfo>(Method.Post, "/room_keys/version", undefined, data);
|
3535
|
-
|
3536
|
-
// We could assume everything's okay and enable directly, but this ensures
|
3537
|
-
// we run the same signature verification that will be used for future
|
3538
|
-
// sessions.
|
3539
|
-
await this.checkKeyBackup();
|
3540
|
-
if (!this.getKeyBackupEnabled()) {
|
3541
|
-
this.logger.error("Key backup not usable even though we just created it");
|
3542
|
-
}
|
3543
|
-
|
3544
|
-
return res;
|
3545
|
-
}
|
3546
|
-
|
3547
|
-
/**
|
3548
|
-
* @deprecated Use {@link Crypto.CryptoApi.deleteKeyBackupVersion | `CryptoApi.deleteKeyBackupVersion`}.
|
3549
|
-
*/
|
3550
|
-
public async deleteKeyBackupVersion(version: string): Promise<void> {
|
3551
|
-
if (!this.cryptoBackend) {
|
3552
|
-
throw new Error("End-to-end encryption disabled");
|
3553
|
-
}
|
3554
|
-
|
3555
|
-
await this.cryptoBackend.deleteKeyBackupVersion(version);
|
3556
|
-
}
|
3557
|
-
|
3558
|
-
private makeKeyBackupPath(roomId?: string, sessionId?: string, version?: string): IKeyBackupPath {
|
3559
|
-
let path: string;
|
3560
|
-
if (sessionId !== undefined) {
|
3561
|
-
path = utils.encodeUri("/room_keys/keys/$roomId/$sessionId", {
|
3562
|
-
$roomId: roomId!,
|
3563
|
-
$sessionId: sessionId,
|
3564
|
-
});
|
3565
|
-
} else if (roomId !== undefined) {
|
3566
|
-
path = utils.encodeUri("/room_keys/keys/$roomId", {
|
3567
|
-
$roomId: roomId,
|
3568
|
-
});
|
3569
|
-
} else {
|
3570
|
-
path = "/room_keys/keys";
|
3571
|
-
}
|
3572
|
-
const queryData = version === undefined ? undefined : { version };
|
3573
|
-
return { path, queryData };
|
3574
|
-
}
|
3575
|
-
|
3576
|
-
/**
|
3577
|
-
* Back up session keys to the homeserver.
|
3578
|
-
* @param roomId - ID of the room that the keys are for Optional.
|
3579
|
-
* @param sessionId - ID of the session that the keys are for Optional.
|
3580
|
-
* @param version - backup version Optional.
|
3581
|
-
* @param data - Object keys to send
|
3582
|
-
* @returns a promise that will resolve when the keys
|
3583
|
-
* are uploaded
|
3584
|
-
*
|
3585
|
-
* @deprecated Not supported for Rust Cryptography.
|
3586
|
-
*/
|
3587
|
-
public sendKeyBackup(
|
3588
|
-
roomId: undefined,
|
3589
|
-
sessionId: undefined,
|
3590
|
-
version: string | undefined,
|
3591
|
-
data: IKeyBackup,
|
3592
|
-
): Promise<void>;
|
3593
|
-
public sendKeyBackup(
|
3594
|
-
roomId: string,
|
3595
|
-
sessionId: undefined,
|
3596
|
-
version: string | undefined,
|
3597
|
-
data: IKeyBackup,
|
3598
|
-
): Promise<void>;
|
3599
|
-
public sendKeyBackup(
|
3600
|
-
roomId: string,
|
3601
|
-
sessionId: string,
|
3602
|
-
version: string | undefined,
|
3603
|
-
data: IKeyBackup,
|
3604
|
-
): Promise<void>;
|
3605
|
-
public async sendKeyBackup(
|
3606
|
-
roomId: string | undefined,
|
3607
|
-
sessionId: string | undefined,
|
3608
|
-
version: string | undefined,
|
3609
|
-
data: IKeyBackup,
|
3610
|
-
): Promise<void> {
|
3611
|
-
if (!this.crypto) {
|
3612
|
-
throw new Error("End-to-end encryption disabled");
|
3613
|
-
}
|
3614
|
-
|
3615
|
-
const path = this.makeKeyBackupPath(roomId!, sessionId!, version);
|
3616
|
-
await this.http.authedRequest(Method.Put, path.path, path.queryData, data, { prefix: ClientPrefix.V3 });
|
3617
|
-
}
|
3618
|
-
|
3619
|
-
/**
|
3620
|
-
* Marks all group sessions as needing to be backed up and schedules them to
|
3621
|
-
* upload in the background as soon as possible.
|
3622
|
-
*
|
3623
|
-
* @deprecated Not supported for Rust Cryptography. This is done automatically as part of
|
3624
|
-
* {@link CryptoApi.resetKeyBackup}, so there is probably no need to call this manually.
|
3625
|
-
*/
|
3626
|
-
public async scheduleAllGroupSessionsForBackup(): Promise<void> {
|
3627
|
-
if (!this.crypto) {
|
3628
|
-
throw new Error("End-to-end encryption disabled");
|
3629
|
-
}
|
3630
|
-
|
3631
|
-
await this.crypto.backupManager.scheduleAllGroupSessionsForBackup();
|
3632
|
-
}
|
3633
|
-
|
3634
|
-
/**
|
3635
|
-
* Marks all group sessions as needing to be backed up without scheduling
|
3636
|
-
* them to upload in the background.
|
3637
|
-
*
|
3638
|
-
* (This is done automatically as part of {@link CryptoApi.resetKeyBackup},
|
3639
|
-
* so there is probably no need to call this manually.)
|
3640
|
-
*
|
3641
|
-
* @returns Promise which resolves to the number of sessions requiring a backup.
|
3642
|
-
* @deprecated Not supported for Rust Cryptography.
|
3643
|
-
*/
|
3644
|
-
public flagAllGroupSessionsForBackup(): Promise<number> {
|
3645
|
-
if (!this.crypto) {
|
3646
|
-
throw new Error("End-to-end encryption disabled");
|
3647
|
-
}
|
3648
|
-
|
3649
|
-
return this.crypto.backupManager.flagAllGroupSessionsForBackup();
|
3650
|
-
}
|
3651
|
-
|
3652
|
-
/**
|
3653
|
-
* Return true if recovery key is valid.
|
3654
|
-
* Try to decode the recovery key and check if it's successful.
|
3655
|
-
* @param recoveryKey
|
3656
|
-
* @deprecated Use {@link decodeRecoveryKey} directly
|
3657
|
-
*/
|
3658
|
-
public isValidRecoveryKey(recoveryKey: string): boolean {
|
3659
|
-
try {
|
3660
|
-
decodeRecoveryKey(recoveryKey);
|
3661
|
-
return true;
|
3662
|
-
} catch {
|
3663
|
-
return false;
|
3664
|
-
}
|
3665
|
-
}
|
3666
|
-
|
3667
|
-
/**
|
3668
|
-
* Get the raw key for a key backup from the password
|
3669
|
-
* Used when migrating key backups into SSSS
|
3670
|
-
*
|
3671
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
3672
|
-
*
|
3673
|
-
* @param password - Passphrase
|
3674
|
-
* @param backupInfo - Backup metadata from `checkKeyBackup`
|
3675
|
-
* @returns key backup key
|
3676
|
-
* @deprecated Deriving a backup key from a passphrase is not part of the matrix spec. Instead, a random key is generated and stored/shared via 4S.
|
3677
|
-
*/
|
3678
|
-
public keyBackupKeyFromPassword(password: string, backupInfo: IKeyBackupInfo): Promise<Uint8Array> {
|
3679
|
-
return keyFromAuthData(backupInfo.auth_data, password);
|
3680
|
-
}
|
3681
|
-
|
3682
|
-
/**
|
3683
|
-
* Get the raw key for a key backup from the recovery key
|
3684
|
-
* Used when migrating key backups into SSSS
|
3685
|
-
*
|
3686
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
3687
|
-
*
|
3688
|
-
* @param recoveryKey - The recovery key
|
3689
|
-
* @returns key backup key
|
3690
|
-
* @deprecated Use {@link decodeRecoveryKey} directly
|
3691
|
-
*/
|
3692
|
-
public keyBackupKeyFromRecoveryKey(recoveryKey: string): Uint8Array {
|
3693
|
-
return decodeRecoveryKey(recoveryKey);
|
3694
|
-
}
|
3695
|
-
|
3696
|
-
/**
|
3697
|
-
* Restore from an existing key backup via a passphrase.
|
3698
|
-
*
|
3699
|
-
* @param password - Passphrase
|
3700
|
-
* @param targetRoomId - Room ID to target a specific room.
|
3701
|
-
* Restores all rooms if omitted.
|
3702
|
-
* @param targetSessionId - Session ID to target a specific session.
|
3703
|
-
* Restores all sessions if omitted.
|
3704
|
-
* @param backupInfo - Backup metadata from `getKeyBackupVersion` or `checkKeyBackup`.`backupInfo`
|
3705
|
-
* @param opts - Optional params such as callbacks
|
3706
|
-
* @returns Status of restoration with `total` and `imported`
|
3707
|
-
* key counts.
|
3708
|
-
*
|
3709
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
|
3710
|
-
*/
|
3711
|
-
public async restoreKeyBackupWithPassword(
|
3712
|
-
password: string,
|
3713
|
-
targetRoomId: undefined,
|
3714
|
-
targetSessionId: undefined,
|
3715
|
-
backupInfo: IKeyBackupInfo,
|
3716
|
-
opts: IKeyBackupRestoreOpts,
|
3717
|
-
): Promise<IKeyBackupRestoreResult>;
|
3718
|
-
/**
|
3719
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
|
3720
|
-
*/
|
3721
|
-
public async restoreKeyBackupWithPassword(
|
3722
|
-
password: string,
|
3723
|
-
targetRoomId: string,
|
3724
|
-
targetSessionId: undefined,
|
3725
|
-
backupInfo: IKeyBackupInfo,
|
3726
|
-
opts: IKeyBackupRestoreOpts,
|
3727
|
-
): Promise<IKeyBackupRestoreResult>;
|
3728
|
-
/**
|
3729
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
|
3730
|
-
*/
|
3731
|
-
public async restoreKeyBackupWithPassword(
|
3732
|
-
password: string,
|
3733
|
-
targetRoomId: string,
|
3734
|
-
targetSessionId: string,
|
3735
|
-
backupInfo: IKeyBackupInfo,
|
3736
|
-
opts: IKeyBackupRestoreOpts,
|
3737
|
-
): Promise<IKeyBackupRestoreResult>;
|
3738
|
-
/**
|
3739
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
|
3740
|
-
*/
|
3741
|
-
public async restoreKeyBackupWithPassword(
|
3742
|
-
password: string,
|
3743
|
-
targetRoomId: string | undefined,
|
3744
|
-
targetSessionId: string | undefined,
|
3745
|
-
backupInfo: IKeyBackupInfo,
|
3746
|
-
opts: IKeyBackupRestoreOpts,
|
3747
|
-
): Promise<IKeyBackupRestoreResult> {
|
3748
|
-
const privKey = await keyFromAuthData(backupInfo.auth_data, password);
|
3749
|
-
return this.restoreKeyBackup(privKey, targetRoomId!, targetSessionId!, backupInfo, opts);
|
3750
|
-
}
|
3751
|
-
|
3752
|
-
/**
|
3753
|
-
* Restore from an existing key backup via a private key stored in secret
|
3754
|
-
* storage.
|
3755
|
-
*
|
3756
|
-
* @param backupInfo - Backup metadata from `checkKeyBackup`
|
3757
|
-
* @param targetRoomId - Room ID to target a specific room.
|
3758
|
-
* Restores all rooms if omitted.
|
3759
|
-
* @param targetSessionId - Session ID to target a specific session.
|
3760
|
-
* Restores all sessions if omitted.
|
3761
|
-
* @param opts - Optional params such as callbacks
|
3762
|
-
* @returns Status of restoration with `total` and `imported`
|
3763
|
-
* key counts.
|
3764
|
-
*
|
3765
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
3766
|
-
*/
|
3767
|
-
public async restoreKeyBackupWithSecretStorage(
|
3768
|
-
backupInfo: IKeyBackupInfo,
|
3769
|
-
targetRoomId?: string,
|
3770
|
-
targetSessionId?: string,
|
3771
|
-
opts?: IKeyBackupRestoreOpts,
|
3772
|
-
): Promise<IKeyBackupRestoreResult> {
|
3773
|
-
if (!this.cryptoBackend) {
|
3774
|
-
throw new Error("End-to-end encryption disabled");
|
3775
|
-
}
|
3776
|
-
const storedKey = await this.secretStorage.get("m.megolm_backup.v1");
|
3777
|
-
|
3778
|
-
// ensure that the key is in the right format. If not, fix the key and
|
3779
|
-
// store the fixed version
|
3780
|
-
const fixedKey = fixBackupKey(storedKey);
|
3781
|
-
if (fixedKey) {
|
3782
|
-
const keys = await this.secretStorage.getKey();
|
3783
|
-
await this.secretStorage.store("m.megolm_backup.v1", fixedKey, [keys![0]]);
|
3784
|
-
}
|
3785
|
-
|
3786
|
-
const privKey = decodeBase64(fixedKey || storedKey!);
|
3787
|
-
return this.restoreKeyBackup(privKey, targetRoomId!, targetSessionId!, backupInfo, opts);
|
3788
|
-
}
|
3789
|
-
|
3790
|
-
/**
|
3791
|
-
* Restore from an existing key backup via an encoded recovery key.
|
3792
|
-
*
|
3793
|
-
* @param recoveryKey - Encoded recovery key
|
3794
|
-
* @param targetRoomId - Room ID to target a specific room.
|
3795
|
-
* Restores all rooms if omitted.
|
3796
|
-
* @param targetSessionId - Session ID to target a specific session.
|
3797
|
-
* Restores all sessions if omitted.
|
3798
|
-
* @param backupInfo - Backup metadata from `checkKeyBackup`
|
3799
|
-
* @param opts - Optional params such as callbacks
|
3800
|
-
|
3801
|
-
* @returns Status of restoration with `total` and `imported`
|
3802
|
-
* key counts.
|
3803
|
-
*
|
3804
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
3805
|
-
*/
|
3806
|
-
public restoreKeyBackupWithRecoveryKey(
|
3807
|
-
recoveryKey: string,
|
3808
|
-
targetRoomId: undefined,
|
3809
|
-
targetSessionId: undefined,
|
3810
|
-
backupInfo: IKeyBackupInfo,
|
3811
|
-
opts?: IKeyBackupRestoreOpts,
|
3812
|
-
): Promise<IKeyBackupRestoreResult>;
|
3813
|
-
/**
|
3814
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
3815
|
-
*/
|
3816
|
-
public restoreKeyBackupWithRecoveryKey(
|
3817
|
-
recoveryKey: string,
|
3818
|
-
targetRoomId: string,
|
3819
|
-
targetSessionId: undefined,
|
3820
|
-
backupInfo: IKeyBackupInfo,
|
3821
|
-
opts?: IKeyBackupRestoreOpts,
|
3822
|
-
): Promise<IKeyBackupRestoreResult>;
|
3823
|
-
/**
|
3824
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
3825
|
-
*/
|
3826
|
-
public restoreKeyBackupWithRecoveryKey(
|
3827
|
-
recoveryKey: string,
|
3828
|
-
targetRoomId: string,
|
3829
|
-
targetSessionId: string,
|
3830
|
-
backupInfo: IKeyBackupInfo,
|
3831
|
-
opts?: IKeyBackupRestoreOpts,
|
3832
|
-
): Promise<IKeyBackupRestoreResult>;
|
3833
|
-
/**
|
3834
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
3835
|
-
*/
|
3836
|
-
public restoreKeyBackupWithRecoveryKey(
|
3837
|
-
recoveryKey: string,
|
3838
|
-
targetRoomId: string | undefined,
|
3839
|
-
targetSessionId: string | undefined,
|
3840
|
-
backupInfo: IKeyBackupInfo,
|
3841
|
-
opts?: IKeyBackupRestoreOpts,
|
3842
|
-
): Promise<IKeyBackupRestoreResult> {
|
3843
|
-
const privKey = decodeRecoveryKey(recoveryKey);
|
3844
|
-
return this.restoreKeyBackup(privKey, targetRoomId!, targetSessionId!, backupInfo, opts);
|
3845
|
-
}
|
3846
|
-
|
3847
|
-
/**
|
3848
|
-
* Restore from an existing key backup via a private key stored locally
|
3849
|
-
* @param targetRoomId
|
3850
|
-
* @param targetSessionId
|
3851
|
-
* @param backupInfo
|
3852
|
-
* @param opts
|
3853
|
-
*
|
3854
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
3855
|
-
*/
|
3856
|
-
public async restoreKeyBackupWithCache(
|
3857
|
-
targetRoomId: undefined,
|
3858
|
-
targetSessionId: undefined,
|
3859
|
-
backupInfo: IKeyBackupInfo,
|
3860
|
-
opts?: IKeyBackupRestoreOpts,
|
3861
|
-
): Promise<IKeyBackupRestoreResult>;
|
3862
|
-
/**
|
3863
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
3864
|
-
*/
|
3865
|
-
public async restoreKeyBackupWithCache(
|
3866
|
-
targetRoomId: string,
|
3867
|
-
targetSessionId: undefined,
|
3868
|
-
backupInfo: IKeyBackupInfo,
|
3869
|
-
opts?: IKeyBackupRestoreOpts,
|
3870
|
-
): Promise<IKeyBackupRestoreResult>;
|
3871
|
-
/**
|
3872
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
3873
|
-
*/
|
3874
|
-
public async restoreKeyBackupWithCache(
|
3875
|
-
targetRoomId: string,
|
3876
|
-
targetSessionId: string,
|
3877
|
-
backupInfo: IKeyBackupInfo,
|
3878
|
-
opts?: IKeyBackupRestoreOpts,
|
3879
|
-
): Promise<IKeyBackupRestoreResult>;
|
3880
|
-
/**
|
3881
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
3882
|
-
*/
|
3883
|
-
public async restoreKeyBackupWithCache(
|
3884
|
-
targetRoomId: string | undefined,
|
3885
|
-
targetSessionId: string | undefined,
|
3886
|
-
backupInfo: IKeyBackupInfo,
|
3887
|
-
opts?: IKeyBackupRestoreOpts,
|
3888
|
-
): Promise<IKeyBackupRestoreResult> {
|
3889
|
-
if (!this.cryptoBackend) {
|
3890
|
-
throw new Error("End-to-end encryption disabled");
|
3891
|
-
}
|
3892
|
-
const privKey = await this.cryptoBackend.getSessionBackupPrivateKey();
|
3893
|
-
if (!privKey) {
|
3894
|
-
throw new Error("Couldn't get key");
|
3895
|
-
}
|
3896
|
-
return this.restoreKeyBackup(privKey, targetRoomId!, targetSessionId!, backupInfo, opts);
|
3897
|
-
}
|
3898
|
-
|
3899
|
-
private async restoreKeyBackup(
|
3900
|
-
privKey: ArrayLike<number>,
|
3901
|
-
targetRoomId: undefined,
|
3902
|
-
targetSessionId: undefined,
|
3903
|
-
backupInfo: IKeyBackupInfo,
|
3904
|
-
opts?: IKeyBackupRestoreOpts,
|
3905
|
-
): Promise<IKeyBackupRestoreResult>;
|
3906
|
-
private async restoreKeyBackup(
|
3907
|
-
privKey: ArrayLike<number>,
|
3908
|
-
targetRoomId: string,
|
3909
|
-
targetSessionId: undefined,
|
3910
|
-
backupInfo: IKeyBackupInfo,
|
3911
|
-
opts?: IKeyBackupRestoreOpts,
|
3912
|
-
): Promise<IKeyBackupRestoreResult>;
|
3913
|
-
private async restoreKeyBackup(
|
3914
|
-
privKey: ArrayLike<number>,
|
3915
|
-
targetRoomId: string,
|
3916
|
-
targetSessionId: string,
|
3917
|
-
backupInfo: IKeyBackupInfo,
|
3918
|
-
opts?: IKeyBackupRestoreOpts,
|
3919
|
-
): Promise<IKeyBackupRestoreResult>;
|
3920
|
-
private async restoreKeyBackup(
|
3921
|
-
privKey: ArrayLike<number>,
|
3922
|
-
targetRoomId: string | undefined,
|
3923
|
-
targetSessionId: string | undefined,
|
3924
|
-
backupInfo: IKeyBackupInfo,
|
3925
|
-
opts?: IKeyBackupRestoreOpts,
|
3926
|
-
): Promise<IKeyBackupRestoreResult> {
|
3927
|
-
const cacheCompleteCallback = opts?.cacheCompleteCallback;
|
3928
|
-
const progressCallback = opts?.progressCallback;
|
3929
|
-
|
3930
|
-
if (!this.cryptoBackend) {
|
3931
|
-
throw new Error("End-to-end encryption disabled");
|
3932
|
-
}
|
3933
|
-
|
3934
|
-
if (!backupInfo.version) {
|
3935
|
-
throw new Error("Backup version must be defined");
|
3936
|
-
}
|
3937
|
-
const backupVersion = backupInfo.version!;
|
3938
|
-
|
3939
|
-
let totalKeyCount = 0;
|
3940
|
-
let totalFailures = 0;
|
3941
|
-
let totalImported = 0;
|
3942
|
-
|
3943
|
-
const path = this.makeKeyBackupPath(targetRoomId, targetSessionId, backupVersion);
|
3944
|
-
|
3945
|
-
const backupDecryptor = await this.cryptoBackend.getBackupDecryptor(backupInfo, privKey);
|
3946
|
-
|
3947
|
-
const untrusted = !backupDecryptor.sourceTrusted;
|
3948
|
-
|
3949
|
-
try {
|
3950
|
-
if (!(privKey instanceof Uint8Array)) {
|
3951
|
-
// eslint-disable-next-line @typescript-eslint/no-base-to-string
|
3952
|
-
throw new Error(`restoreKeyBackup expects Uint8Array, got ${privKey}`);
|
3953
|
-
}
|
3954
|
-
// Cache the key, if possible.
|
3955
|
-
// This is async.
|
3956
|
-
this.cryptoBackend
|
3957
|
-
.storeSessionBackupPrivateKey(privKey, backupVersion)
|
3958
|
-
.catch((e) => {
|
3959
|
-
this.logger.warn("Error caching session backup key:", e);
|
3960
|
-
})
|
3961
|
-
.then(cacheCompleteCallback);
|
3962
|
-
|
3963
|
-
if (progressCallback) {
|
3964
|
-
progressCallback({
|
3965
|
-
stage: "fetch",
|
3966
|
-
});
|
3967
|
-
}
|
3968
|
-
|
3969
|
-
const res = await this.http.authedRequest<IRoomsKeysResponse | IRoomKeysResponse | IKeyBackupSession>(
|
3970
|
-
Method.Get,
|
3971
|
-
path.path,
|
3972
|
-
path.queryData,
|
3973
|
-
undefined,
|
3974
|
-
{ prefix: ClientPrefix.V3 },
|
3975
|
-
);
|
3976
|
-
|
3977
|
-
// We have finished fetching the backup, go to next step
|
3978
|
-
if (progressCallback) {
|
3979
|
-
progressCallback({
|
3980
|
-
stage: "load_keys",
|
3981
|
-
});
|
3982
|
-
}
|
3983
|
-
|
3984
|
-
if ((res as IRoomsKeysResponse).rooms) {
|
3985
|
-
// We have a full backup here, it can get quite big, so we need to decrypt and import it in chunks.
|
3986
|
-
|
3987
|
-
// Get the total count as a first pass
|
3988
|
-
totalKeyCount = this.getTotalKeyCount(res as IRoomsKeysResponse);
|
3989
|
-
// Now decrypt and import the keys in chunks
|
3990
|
-
await this.handleDecryptionOfAFullBackup(
|
3991
|
-
res as IRoomsKeysResponse,
|
3992
|
-
backupDecryptor,
|
3993
|
-
200,
|
3994
|
-
async (chunk) => {
|
3995
|
-
// We have a chunk of decrypted keys: import them
|
3996
|
-
try {
|
3997
|
-
const backupVersion = backupInfo.version!;
|
3998
|
-
await this.cryptoBackend!.importBackedUpRoomKeys(chunk, backupVersion, {
|
3999
|
-
untrusted,
|
4000
|
-
});
|
4001
|
-
totalImported += chunk.length;
|
4002
|
-
} catch (e) {
|
4003
|
-
totalFailures += chunk.length;
|
4004
|
-
// We failed to import some keys, but we should still try to import the rest?
|
4005
|
-
// Log the error and continue
|
4006
|
-
logger.error("Error importing keys from backup", e);
|
4007
|
-
}
|
4008
|
-
|
4009
|
-
if (progressCallback) {
|
4010
|
-
progressCallback({
|
4011
|
-
total: totalKeyCount,
|
4012
|
-
successes: totalImported,
|
4013
|
-
stage: "load_keys",
|
4014
|
-
failures: totalFailures,
|
4015
|
-
});
|
4016
|
-
}
|
4017
|
-
},
|
4018
|
-
);
|
4019
|
-
} else if ((res as IRoomKeysResponse).sessions) {
|
4020
|
-
// For now we don't chunk for a single room backup, but we could in the future.
|
4021
|
-
// Currently it is not used by the application.
|
4022
|
-
const sessions = (res as IRoomKeysResponse).sessions;
|
4023
|
-
totalKeyCount = Object.keys(sessions).length;
|
4024
|
-
const keys = await backupDecryptor.decryptSessions(sessions);
|
4025
|
-
for (const k of keys) {
|
4026
|
-
k.room_id = targetRoomId!;
|
4027
|
-
}
|
4028
|
-
await this.cryptoBackend.importBackedUpRoomKeys(keys, backupVersion, {
|
4029
|
-
progressCallback,
|
4030
|
-
untrusted,
|
4031
|
-
});
|
4032
|
-
totalImported = keys.length;
|
4033
|
-
} else {
|
4034
|
-
totalKeyCount = 1;
|
4035
|
-
try {
|
4036
|
-
const [key] = await backupDecryptor.decryptSessions({
|
4037
|
-
[targetSessionId!]: res as IKeyBackupSession,
|
4038
|
-
});
|
4039
|
-
key.room_id = targetRoomId!;
|
4040
|
-
key.session_id = targetSessionId!;
|
4041
|
-
|
4042
|
-
await this.cryptoBackend.importBackedUpRoomKeys([key], backupVersion, {
|
4043
|
-
progressCallback,
|
4044
|
-
untrusted,
|
4045
|
-
});
|
4046
|
-
totalImported = 1;
|
4047
|
-
} catch (e) {
|
4048
|
-
this.logger.debug("Failed to decrypt megolm session from backup", e);
|
4049
|
-
}
|
4050
|
-
}
|
4051
|
-
} finally {
|
4052
|
-
backupDecryptor.free();
|
4053
|
-
}
|
1432
|
+
public setGuest(guest: boolean): void {
|
1433
|
+
this.isGuestAccount = guest;
|
1434
|
+
}
|
4054
1435
|
|
4055
|
-
|
4056
|
-
|
1436
|
+
/**
|
1437
|
+
* Return the provided scheduler, if any.
|
1438
|
+
* @returns The scheduler or undefined
|
1439
|
+
*/
|
1440
|
+
public getScheduler(): MatrixScheduler | undefined {
|
1441
|
+
return this.scheduler;
|
1442
|
+
}
|
4057
1443
|
|
4058
|
-
|
1444
|
+
/**
|
1445
|
+
* Retry a backed off syncing request immediately. This should only be used when
|
1446
|
+
* the user <b>explicitly</b> attempts to retry their lost connection.
|
1447
|
+
* Will also retry any outbound to-device messages currently in the queue to be sent
|
1448
|
+
* (retries of regular outgoing events are handled separately, per-event).
|
1449
|
+
* @returns True if this resulted in a request being retried.
|
1450
|
+
*/
|
1451
|
+
public retryImmediately(): boolean {
|
1452
|
+
// don't await for this promise: we just want to kick it off
|
1453
|
+
this.toDeviceMessageQueue.sendQueue();
|
1454
|
+
return this.syncApi?.retryImmediately() ?? false;
|
4059
1455
|
}
|
4060
1456
|
|
4061
1457
|
/**
|
4062
|
-
*
|
4063
|
-
*
|
4064
|
-
* @param res - The response from the server containing the keys to be counted.
|
1458
|
+
* Return the global notification EventTimelineSet, if any
|
4065
1459
|
*
|
4066
|
-
* @returns
|
1460
|
+
* @returns the globl notification EventTimelineSet
|
4067
1461
|
*/
|
4068
|
-
|
4069
|
-
|
4070
|
-
let totalKeyCount = 0;
|
4071
|
-
for (const roomData of Object.values(rooms)) {
|
4072
|
-
if (!roomData.sessions) continue;
|
4073
|
-
totalKeyCount += Object.keys(roomData.sessions).length;
|
4074
|
-
}
|
4075
|
-
return totalKeyCount;
|
1462
|
+
public getNotifTimelineSet(): EventTimelineSet | null {
|
1463
|
+
return this.notifTimelineSet;
|
4076
1464
|
}
|
4077
1465
|
|
4078
1466
|
/**
|
4079
|
-
*
|
4080
|
-
* It will decrypt the keys in chunks and call the `block` callback for each chunk.
|
4081
|
-
*
|
4082
|
-
* @param res - The response from the server containing the keys to be decrypted.
|
4083
|
-
* @param backupDecryptor - An instance of the BackupDecryptor class used to decrypt the keys.
|
4084
|
-
* @param chunkSize - The size of the chunks to be processed at a time.
|
4085
|
-
* @param block - A callback function that is called for each chunk of keys.
|
1467
|
+
* Set the global notification EventTimelineSet
|
4086
1468
|
*
|
4087
|
-
* @returns A promise that resolves when the decryption is complete.
|
4088
1469
|
*/
|
4089
|
-
|
4090
|
-
|
4091
|
-
|
4092
|
-
chunkSize: number,
|
4093
|
-
block: (chunk: IMegolmSessionData[]) => Promise<void>,
|
4094
|
-
): Promise<void> {
|
4095
|
-
const rooms = (res as IRoomsKeysResponse).rooms;
|
4096
|
-
|
4097
|
-
let groupChunkCount = 0;
|
4098
|
-
let chunkGroupByRoom: Map<string, IKeyBackupRoomSessions> = new Map();
|
1470
|
+
public setNotifTimelineSet(set: EventTimelineSet): void {
|
1471
|
+
this.notifTimelineSet = set;
|
1472
|
+
}
|
4099
1473
|
|
4100
|
-
|
4101
|
-
|
4102
|
-
|
4103
|
-
|
4104
|
-
|
4105
|
-
|
4106
|
-
|
4107
|
-
|
4108
|
-
|
4109
|
-
|
4110
|
-
|
4111
|
-
};
|
1474
|
+
/**
|
1475
|
+
* Gets the cached capabilities of the homeserver, returning cached ones if available.
|
1476
|
+
* If there are no cached capabilities and none can be fetched, throw an exception.
|
1477
|
+
*
|
1478
|
+
* @returns Promise resolving with The capabilities of the homeserver
|
1479
|
+
*/
|
1480
|
+
public async getCapabilities(): Promise<Capabilities> {
|
1481
|
+
const caps = this.serverCapabilitiesService.getCachedCapabilities();
|
1482
|
+
if (caps) return caps;
|
1483
|
+
return this.serverCapabilitiesService.fetchCapabilities();
|
1484
|
+
}
|
4112
1485
|
|
4113
|
-
|
4114
|
-
|
4115
|
-
|
4116
|
-
|
4117
|
-
|
4118
|
-
|
4119
|
-
|
4120
|
-
|
4121
|
-
|
4122
|
-
if (groupChunkCount >= chunkSize) {
|
4123
|
-
// We have enough chunks to decrypt
|
4124
|
-
await handleChunkCallback(chunkGroupByRoom);
|
4125
|
-
chunkGroupByRoom = new Map();
|
4126
|
-
// There might be remaining keys for that room, so add back an entry for the current room.
|
4127
|
-
chunkGroupByRoom.set(roomId, {});
|
4128
|
-
groupChunkCount = 0;
|
4129
|
-
}
|
4130
|
-
}
|
4131
|
-
}
|
1486
|
+
/**
|
1487
|
+
* Gets the cached capabilities of the homeserver. If none have been fetched yet,
|
1488
|
+
* return undefined.
|
1489
|
+
*
|
1490
|
+
* @returns The capabilities of the homeserver
|
1491
|
+
*/
|
1492
|
+
public getCachedCapabilities(): Capabilities | undefined {
|
1493
|
+
return this.serverCapabilitiesService.getCachedCapabilities();
|
1494
|
+
}
|
4132
1495
|
|
4133
|
-
|
4134
|
-
|
4135
|
-
|
4136
|
-
|
1496
|
+
/**
|
1497
|
+
* Fetches the latest capabilities from the homeserver, ignoring any cached
|
1498
|
+
* versions. The newly returned version is cached.
|
1499
|
+
*
|
1500
|
+
* @returns A promise which resolves to the capabilities of the homeserver
|
1501
|
+
*/
|
1502
|
+
public fetchCapabilities(): Promise<Capabilities> {
|
1503
|
+
return this.serverCapabilitiesService.fetchCapabilities();
|
4137
1504
|
}
|
4138
1505
|
|
4139
|
-
|
4140
|
-
|
4141
|
-
|
4142
|
-
public async
|
4143
|
-
|
4144
|
-
await this.http.authedRequest(Method.Delete, path.path, path.queryData, undefined, { prefix: ClientPrefix.V3 });
|
1506
|
+
/**
|
1507
|
+
* @deprecated Does nothing.
|
1508
|
+
*/
|
1509
|
+
public async uploadKeys(): Promise<void> {
|
1510
|
+
this.logger.warn("MatrixClient.uploadKeys is deprecated");
|
4145
1511
|
}
|
4146
1512
|
|
4147
1513
|
/**
|
@@ -4234,7 +1600,10 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
4234
1600
|
* @returns Promise which resolves: an empty object
|
4235
1601
|
* @returns Rejects: with an error response.
|
4236
1602
|
*/
|
4237
|
-
public setAccountData
|
1603
|
+
public setAccountData<K extends keyof AccountDataEvents>(
|
1604
|
+
eventType: K,
|
1605
|
+
content: AccountDataEvents[K] | Record<string, never>,
|
1606
|
+
): Promise<{}> {
|
4238
1607
|
const path = utils.encodeUri("/user/$userId/account_data/$type", {
|
4239
1608
|
$userId: this.credentials.userId!,
|
4240
1609
|
$type: eventType,
|
@@ -4249,7 +1618,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
4249
1618
|
* @param eventType - The event type
|
4250
1619
|
* @returns The contents of the given account data event
|
4251
1620
|
*/
|
4252
|
-
public getAccountData(eventType:
|
1621
|
+
public getAccountData<K extends keyof AccountDataEvents>(eventType: K): MatrixEvent | undefined {
|
4253
1622
|
return this.store.getAccountData(eventType);
|
4254
1623
|
}
|
4255
1624
|
|
@@ -4261,7 +1630,9 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
4261
1630
|
* @returns Promise which resolves: The contents of the given account data event.
|
4262
1631
|
* @returns Rejects: with an error response.
|
4263
1632
|
*/
|
4264
|
-
public async getAccountDataFromServer<
|
1633
|
+
public async getAccountDataFromServer<K extends keyof AccountDataEvents>(
|
1634
|
+
eventType: K,
|
1635
|
+
): Promise<AccountDataEvents[K] | null> {
|
4265
1636
|
if (this.isInitialSyncComplete()) {
|
4266
1637
|
const event = this.store.getAccountData(eventType);
|
4267
1638
|
if (!event) {
|
@@ -4269,7 +1640,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
4269
1640
|
}
|
4270
1641
|
// The network version below returns just the content, so this branch
|
4271
1642
|
// does the same to match.
|
4272
|
-
return event.getContent<
|
1643
|
+
return event.getContent<AccountDataEvents[K]>();
|
4273
1644
|
}
|
4274
1645
|
const path = utils.encodeUri("/user/$userId/account_data/$type", {
|
4275
1646
|
$userId: this.credentials.userId!,
|
@@ -4285,7 +1656,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
4285
1656
|
}
|
4286
1657
|
}
|
4287
1658
|
|
4288
|
-
public async deleteAccountData(eventType:
|
1659
|
+
public async deleteAccountData(eventType: keyof AccountDataEvents): Promise<void> {
|
4289
1660
|
const msc3391DeleteAccountDataServerSupport = this.canSupport.get(Feature.AccountDataDeletion);
|
4290
1661
|
// if deletion is not supported overwrite with empty content
|
4291
1662
|
if (msc3391DeleteAccountDataServerSupport === ServerSupport.Unsupported) {
|
@@ -4308,8 +1679,8 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
4308
1679
|
* @returns The array of users that are ignored (empty if none)
|
4309
1680
|
*/
|
4310
1681
|
public getIgnoredUsers(): string[] {
|
4311
|
-
const event = this.getAccountData(
|
4312
|
-
if (!event
|
1682
|
+
const event = this.getAccountData(EventType.IgnoredUserList);
|
1683
|
+
if (!event?.getContent()["ignored_users"]) return [];
|
4313
1684
|
return Object.keys(event.getContent()["ignored_users"]);
|
4314
1685
|
}
|
4315
1686
|
|
@@ -4324,7 +1695,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
4324
1695
|
userIds.forEach((u) => {
|
4325
1696
|
content.ignored_users[u] = {};
|
4326
1697
|
});
|
4327
|
-
return this.setAccountData(
|
1698
|
+
return this.setAccountData(EventType.IgnoredUserList, content);
|
4328
1699
|
}
|
4329
1700
|
|
4330
1701
|
/**
|
@@ -4817,18 +2188,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
4817
2188
|
}
|
4818
2189
|
|
4819
2190
|
try {
|
4820
|
-
let cancelled: boolean;
|
4821
2191
|
this.eventsBeingEncrypted.add(event.getId()!);
|
4822
|
-
try {
|
4823
|
-
await this.encryptEventIfNeeded(event, room ?? undefined);
|
4824
|
-
} finally {
|
4825
|
-
cancelled = !this.eventsBeingEncrypted.delete(event.getId()!);
|
4826
|
-
}
|
4827
|
-
|
4828
|
-
if (cancelled) {
|
4829
|
-
// cancelled via MatrixClient::cancelPendingEvent
|
4830
|
-
return {} as ISendEventResponse;
|
4831
|
-
}
|
4832
2192
|
|
4833
2193
|
// encryptEventIfNeeded may have updated the status from SENDING to ENCRYPTING. If so, we need
|
4834
2194
|
// to put it back.
|
@@ -4879,70 +2239,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
4879
2239
|
}
|
4880
2240
|
}
|
4881
2241
|
|
4882
|
-
private async encryptEventIfNeeded(event: MatrixEvent, room?: Room): Promise<void> {
|
4883
|
-
// If the room is unknown, we cannot encrypt for it
|
4884
|
-
if (!room) return;
|
4885
|
-
|
4886
|
-
if (!(await this.shouldEncryptEventForRoom(event, room))) return;
|
4887
|
-
|
4888
|
-
if (!this.cryptoBackend && this.usingExternalCrypto) {
|
4889
|
-
// The client has opted to allow sending messages to encrypted
|
4890
|
-
// rooms even if the room is encrypted, and we haven't set up
|
4891
|
-
// crypto. This is useful for users of matrix-org/pantalaimon
|
4892
|
-
return;
|
4893
|
-
}
|
4894
|
-
|
4895
|
-
if (!this.cryptoBackend) {
|
4896
|
-
throw new Error("This room is configured to use encryption, but your client does not support encryption.");
|
4897
|
-
}
|
4898
|
-
|
4899
|
-
this.updatePendingEventStatus(room, event, EventStatus.ENCRYPTING);
|
4900
|
-
await this.cryptoBackend.encryptEvent(event, room);
|
4901
|
-
}
|
4902
|
-
|
4903
|
-
/**
|
4904
|
-
* Determine whether a given event should be encrypted when we send it to the given room.
|
4905
|
-
*
|
4906
|
-
* This takes into account event type and room configuration.
|
4907
|
-
*/
|
4908
|
-
private async shouldEncryptEventForRoom(event: MatrixEvent, room: Room): Promise<boolean> {
|
4909
|
-
if (event.isEncrypted()) {
|
4910
|
-
// this event has already been encrypted; this happens if the
|
4911
|
-
// encryption step succeeded, but the send step failed on the first
|
4912
|
-
// attempt.
|
4913
|
-
return false;
|
4914
|
-
}
|
4915
|
-
|
4916
|
-
if (event.getType() === EventType.Reaction) {
|
4917
|
-
// For reactions, there is a very little gained by encrypting the entire
|
4918
|
-
// event, as relation data is already kept in the clear. Event
|
4919
|
-
// encryption for a reaction effectively only obscures the event type,
|
4920
|
-
// but the purpose is still obvious from the relation data, so nothing
|
4921
|
-
// is really gained. It also causes quite a few problems, such as:
|
4922
|
-
// * triggers notifications via default push rules
|
4923
|
-
// * prevents server-side bundling for reactions
|
4924
|
-
// The reaction key / content / emoji value does warrant encrypting, but
|
4925
|
-
// this will be handled separately by encrypting just this value.
|
4926
|
-
// See https://github.com/matrix-org/matrix-doc/pull/1849#pullrequestreview-248763642
|
4927
|
-
return false;
|
4928
|
-
}
|
4929
|
-
|
4930
|
-
if (event.isRedaction()) {
|
4931
|
-
// Redactions do not support encryption in the spec at this time.
|
4932
|
-
// Whilst it mostly worked in some clients, it wasn't compliant.
|
4933
|
-
return false;
|
4934
|
-
}
|
4935
|
-
|
4936
|
-
// If the room has an m.room.encryption event, we should encrypt.
|
4937
|
-
if (room.hasEncryptionStateEvent()) return true;
|
4938
|
-
|
4939
|
-
// If we have a crypto impl, and *it* thinks we should encrypt, then we should.
|
4940
|
-
if (await this.cryptoBackend?.isEncryptionEnabledInRoom(room.roomId)) return true;
|
4941
|
-
|
4942
|
-
// Otherwise, no need to encrypt.
|
4943
|
-
return false;
|
4944
|
-
}
|
4945
|
-
|
4946
2242
|
/**
|
4947
2243
|
* Returns the eventType that should be used taking encryption into account
|
4948
2244
|
* for a given eventType.
|
@@ -5063,7 +2359,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
5063
2359
|
if (this.canSupport.get(Feature.RelationBasedRedactions) === ServerSupport.Unsupported) {
|
5064
2360
|
throw new Error(
|
5065
2361
|
"Server does not support relation based redactions " +
|
5066
|
-
|
2362
|
+
`roomId ${roomId} eventId ${eventId} txnId: ${txnId as string} threadId ${threadId}`,
|
5067
2363
|
);
|
5068
2364
|
}
|
5069
2365
|
|
@@ -6136,7 +3432,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
6136
3432
|
room.partitionThreadedEvents(matrixEvents);
|
6137
3433
|
|
6138
3434
|
this.processAggregatedTimelineEvents(room, timelineEvents);
|
6139
|
-
room.addEventsToTimeline(timelineEvents, true, room.getLiveTimeline());
|
3435
|
+
room.addEventsToTimeline(timelineEvents, true, true, room.getLiveTimeline());
|
6140
3436
|
this.processThreadEvents(room, threadedEvents, true);
|
6141
3437
|
unknownRelations.forEach((event) => room.relations.aggregateChildEvent(event));
|
6142
3438
|
|
@@ -6185,7 +3481,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
6185
3481
|
if (!this.timelineSupport) {
|
6186
3482
|
throw new Error(
|
6187
3483
|
"timeline support is disabled. Set the 'timelineSupport'" +
|
6188
|
-
|
3484
|
+
" parameter to true when creating MatrixClient to enable it.",
|
6189
3485
|
);
|
6190
3486
|
}
|
6191
3487
|
|
@@ -6248,7 +3544,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
6248
3544
|
}
|
6249
3545
|
|
6250
3546
|
const [timelineEvents, threadedEvents, unknownRelations] = timelineSet.room.partitionThreadedEvents(events);
|
6251
|
-
timelineSet.addEventsToTimeline(timelineEvents, true, timeline, res.start);
|
3547
|
+
timelineSet.addEventsToTimeline(timelineEvents, true, false, timeline, res.start);
|
6252
3548
|
// The target event is not in a thread but process the contextual events, so we can show any threads around it.
|
6253
3549
|
this.processThreadEvents(timelineSet.room, threadedEvents, true);
|
6254
3550
|
this.processAggregatedTimelineEvents(timelineSet.room, timelineEvents);
|
@@ -6342,10 +3638,10 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
6342
3638
|
timeline.initialiseState(res.state.map(mapper));
|
6343
3639
|
}
|
6344
3640
|
|
6345
|
-
timelineSet.addEventsToTimeline(events, true, timeline, resNewer.next_batch);
|
3641
|
+
timelineSet.addEventsToTimeline(events, true, false, timeline, resNewer.next_batch);
|
6346
3642
|
if (!resOlder.next_batch) {
|
6347
3643
|
const originalEvent = await this.fetchRoomEvent(timelineSet.room.roomId, thread.id);
|
6348
|
-
timelineSet.addEventsToTimeline([mapper(originalEvent)], true, timeline, null);
|
3644
|
+
timelineSet.addEventsToTimeline([mapper(originalEvent)], true, false, timeline, null);
|
6349
3645
|
}
|
6350
3646
|
timeline.setPaginationToken(resOlder.next_batch ?? null, Direction.Backward);
|
6351
3647
|
timeline.setPaginationToken(resNewer.next_batch ?? null, Direction.Forward);
|
@@ -6399,10 +3695,10 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
6399
3695
|
const timeline = timelineSet.getLiveTimeline();
|
6400
3696
|
timeline.getState(EventTimeline.BACKWARDS)!.setUnknownStateEvents(res.state.map(mapper));
|
6401
3697
|
|
6402
|
-
timelineSet.addEventsToTimeline(events, true, timeline, null);
|
3698
|
+
timelineSet.addEventsToTimeline(events, true, false, timeline, null);
|
6403
3699
|
if (!resOlder.next_batch) {
|
6404
3700
|
const originalEvent = await this.fetchRoomEvent(timelineSet.room.roomId, thread.id);
|
6405
|
-
timelineSet.addEventsToTimeline([mapper(originalEvent)], true, timeline, null);
|
3701
|
+
timelineSet.addEventsToTimeline([mapper(originalEvent)], true, false, timeline, null);
|
6406
3702
|
}
|
6407
3703
|
timeline.setPaginationToken(resOlder.next_batch ?? null, Direction.Backward);
|
6408
3704
|
timeline.setPaginationToken(null, Direction.Forward);
|
@@ -6428,7 +3724,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
6428
3724
|
if (!this.timelineSupport) {
|
6429
3725
|
throw new Error(
|
6430
3726
|
"timeline support is disabled. Set the 'timelineSupport'" +
|
6431
|
-
|
3727
|
+
" parameter to true when creating MatrixClient to enable it.",
|
6432
3728
|
);
|
6433
3729
|
}
|
6434
3730
|
|
@@ -6665,7 +3961,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
6665
3961
|
// No need to partition events for threads here, everything lives
|
6666
3962
|
// in the notification timeline set
|
6667
3963
|
const timelineSet = eventTimeline.getTimelineSet();
|
6668
|
-
timelineSet.addEventsToTimeline(matrixEvents, backwards, eventTimeline, token);
|
3964
|
+
timelineSet.addEventsToTimeline(matrixEvents, backwards, false, eventTimeline, token);
|
6669
3965
|
this.processAggregatedTimelineEvents(timelineSet.room, matrixEvents);
|
6670
3966
|
|
6671
3967
|
// if we've hit the end of the timeline, we need to stop trying to
|
@@ -6708,7 +4004,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
6708
4004
|
const matrixEvents = res.chunk.filter(noUnsafeEventProps).map(this.getEventMapper());
|
6709
4005
|
|
6710
4006
|
const timelineSet = eventTimeline.getTimelineSet();
|
6711
|
-
timelineSet.addEventsToTimeline(matrixEvents, backwards, eventTimeline, token);
|
4007
|
+
timelineSet.addEventsToTimeline(matrixEvents, backwards, false, eventTimeline, token);
|
6712
4008
|
this.processAggregatedTimelineEvents(room, matrixEvents);
|
6713
4009
|
this.processThreadRoots(room, matrixEvents, backwards);
|
6714
4010
|
|
@@ -6756,12 +4052,12 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
6756
4052
|
const newToken = res.next_batch;
|
6757
4053
|
|
6758
4054
|
const timelineSet = eventTimeline.getTimelineSet();
|
6759
|
-
timelineSet.addEventsToTimeline(matrixEvents, backwards, eventTimeline, newToken ?? null);
|
4055
|
+
timelineSet.addEventsToTimeline(matrixEvents, backwards, false, eventTimeline, newToken ?? null);
|
6760
4056
|
if (!newToken && backwards) {
|
6761
4057
|
const originalEvent =
|
6762
4058
|
thread.rootEvent ??
|
6763
4059
|
mapper(await this.fetchRoomEvent(eventTimeline.getRoomId() ?? "", thread.id));
|
6764
|
-
timelineSet.addEventsToTimeline([originalEvent], true, eventTimeline, null);
|
4060
|
+
timelineSet.addEventsToTimeline([originalEvent], true, false, eventTimeline, null);
|
6765
4061
|
}
|
6766
4062
|
this.processAggregatedTimelineEvents(timelineSet.room, matrixEvents);
|
6767
4063
|
|
@@ -6800,7 +4096,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
6800
4096
|
|
6801
4097
|
const timelineSet = eventTimeline.getTimelineSet();
|
6802
4098
|
const [timelineEvents, , unknownRelations] = room.partitionThreadedEvents(matrixEvents);
|
6803
|
-
timelineSet.addEventsToTimeline(timelineEvents, backwards, eventTimeline, token);
|
4099
|
+
timelineSet.addEventsToTimeline(timelineEvents, backwards, false, eventTimeline, token);
|
6804
4100
|
this.processAggregatedTimelineEvents(room, timelineEvents);
|
6805
4101
|
this.processThreadRoots(
|
6806
4102
|
room,
|
@@ -7341,8 +4637,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
7341
4637
|
if (room) {
|
7342
4638
|
// Copy over a known event sender if we can
|
7343
4639
|
for (const ev of sr.context.getTimeline()) {
|
7344
|
-
|
7345
|
-
if (!ev.sender && sender) ev.sender = sender;
|
4640
|
+
ev.setMetadata(room.currentState, false);
|
7346
4641
|
}
|
7347
4642
|
}
|
7348
4643
|
searchResults.results.push(sr);
|
@@ -7493,25 +4788,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
7493
4788
|
return this.http.authedRequest(Method.Post, path, undefined, {});
|
7494
4789
|
}
|
7495
4790
|
|
7496
|
-
private startCallEventHandler = (): void => {
|
7497
|
-
if (this.isInitialSyncComplete()) {
|
7498
|
-
if (supportsMatrixCall()) {
|
7499
|
-
this.callEventHandler!.start();
|
7500
|
-
this.groupCallEventHandler!.start();
|
7501
|
-
}
|
7502
|
-
|
7503
|
-
this.off(ClientEvent.Sync, this.startCallEventHandler);
|
7504
|
-
}
|
7505
|
-
};
|
7506
|
-
|
7507
|
-
private startMatrixRTC = (): void => {
|
7508
|
-
if (this.isInitialSyncComplete()) {
|
7509
|
-
this.matrixRTC.start();
|
7510
|
-
|
7511
|
-
this.off(ClientEvent.Sync, this.startMatrixRTC);
|
7512
|
-
}
|
7513
|
-
};
|
7514
|
-
|
7515
4791
|
/**
|
7516
4792
|
* Once the client has been initialised, we want to clear notifications we
|
7517
4793
|
* know for a fact should be here.
|
@@ -7537,84 +4813,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
7537
4813
|
}
|
7538
4814
|
};
|
7539
4815
|
|
7540
|
-
/**
|
7541
|
-
* @returns Promise which resolves: ITurnServerResponse object
|
7542
|
-
* @returns Rejects: with an error response.
|
7543
|
-
*/
|
7544
|
-
public turnServer(): Promise<ITurnServerResponse> {
|
7545
|
-
return this.http.authedRequest(Method.Get, "/voip/turnServer");
|
7546
|
-
}
|
7547
|
-
|
7548
|
-
/**
|
7549
|
-
* Get the TURN servers for this homeserver.
|
7550
|
-
* @returns The servers or an empty list.
|
7551
|
-
*/
|
7552
|
-
public getTurnServers(): ITurnServer[] {
|
7553
|
-
return this.turnServers || [];
|
7554
|
-
}
|
7555
|
-
|
7556
|
-
/**
|
7557
|
-
* Get the unix timestamp (in milliseconds) at which the current
|
7558
|
-
* TURN credentials (from getTurnServers) expire
|
7559
|
-
* @returns The expiry timestamp in milliseconds
|
7560
|
-
*/
|
7561
|
-
public getTurnServersExpiry(): number {
|
7562
|
-
return this.turnServersExpiry;
|
7563
|
-
}
|
7564
|
-
|
7565
|
-
public get pollingTurnServers(): boolean {
|
7566
|
-
return this.checkTurnServersIntervalID !== undefined;
|
7567
|
-
}
|
7568
|
-
|
7569
|
-
// XXX: Intended private, used in code.
|
7570
|
-
public async checkTurnServers(): Promise<boolean | undefined> {
|
7571
|
-
if (!this.canSupportVoip) {
|
7572
|
-
return;
|
7573
|
-
}
|
7574
|
-
|
7575
|
-
let credentialsGood = false;
|
7576
|
-
const remainingTime = this.turnServersExpiry - Date.now();
|
7577
|
-
if (remainingTime > TURN_CHECK_INTERVAL) {
|
7578
|
-
this.logger.debug("TURN creds are valid for another " + remainingTime + " ms: not fetching new ones.");
|
7579
|
-
credentialsGood = true;
|
7580
|
-
} else {
|
7581
|
-
this.logger.debug("Fetching new TURN credentials");
|
7582
|
-
try {
|
7583
|
-
const res = await this.turnServer();
|
7584
|
-
if (res.uris) {
|
7585
|
-
this.logger.debug("Got TURN URIs: " + res.uris + " refresh in " + res.ttl + " secs");
|
7586
|
-
// map the response to a format that can be fed to RTCPeerConnection
|
7587
|
-
const servers: ITurnServer = {
|
7588
|
-
urls: res.uris,
|
7589
|
-
username: res.username,
|
7590
|
-
credential: res.password,
|
7591
|
-
};
|
7592
|
-
this.turnServers = [servers];
|
7593
|
-
// The TTL is in seconds but we work in ms
|
7594
|
-
this.turnServersExpiry = Date.now() + res.ttl * 1000;
|
7595
|
-
credentialsGood = true;
|
7596
|
-
this.emit(ClientEvent.TurnServers, this.turnServers);
|
7597
|
-
}
|
7598
|
-
} catch (err) {
|
7599
|
-
this.logger.error("Failed to get TURN URIs", err);
|
7600
|
-
if ((<HTTPError>err).httpStatus === 403) {
|
7601
|
-
// We got a 403, so there's no point in looping forever.
|
7602
|
-
this.logger.info("TURN access unavailable for this account: stopping credentials checks");
|
7603
|
-
if (this.checkTurnServersIntervalID !== null) {
|
7604
|
-
globalThis.clearInterval(this.checkTurnServersIntervalID);
|
7605
|
-
}
|
7606
|
-
this.checkTurnServersIntervalID = undefined;
|
7607
|
-
this.emit(ClientEvent.TurnServersError, <HTTPError>err, true); // fatal
|
7608
|
-
} else {
|
7609
|
-
// otherwise, if we failed for whatever reason, try again the next time we're called.
|
7610
|
-
this.emit(ClientEvent.TurnServersError, <Error>err, false); // non-fatal
|
7611
|
-
}
|
7612
|
-
}
|
7613
|
-
}
|
7614
|
-
|
7615
|
-
return credentialsGood;
|
7616
|
-
}
|
7617
|
-
|
7618
4816
|
/**
|
7619
4817
|
* Set whether to allow a fallback ICE server should be used for negotiating a
|
7620
4818
|
* WebRTC connection if the homeserver doesn't provide any servers. Defaults to
|
@@ -7956,8 +5154,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
7956
5154
|
let events = result.chunk.map(mapper);
|
7957
5155
|
|
7958
5156
|
if (fetchedEventType === EventType.RoomMessageEncrypted) {
|
7959
|
-
const allEvents = originalEvent ? events.concat(originalEvent) : events;
|
7960
|
-
await Promise.all(allEvents.map((e) => this.decryptEventIfNeeded(e)));
|
7961
5157
|
if (eventType !== null) {
|
7962
5158
|
events = events.filter((e) => e.getType() === eventType);
|
7963
5159
|
}
|
@@ -7974,24 +5170,13 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
7974
5170
|
};
|
7975
5171
|
}
|
7976
5172
|
|
7977
|
-
/**
|
7978
|
-
* The app may wish to see if we have a key cached without
|
7979
|
-
* triggering a user interaction.
|
7980
|
-
*
|
7981
|
-
* @deprecated Not supported for Rust Cryptography.
|
7982
|
-
*/
|
7983
|
-
public getCrossSigningCacheCallbacks(): ICacheCallbacks | undefined {
|
7984
|
-
// XXX: Private member access
|
7985
|
-
return this.crypto?.crossSigningInfo.getCacheCallbacks();
|
7986
|
-
}
|
7987
|
-
|
7988
5173
|
/**
|
7989
5174
|
* Generates a random string suitable for use as a client secret. <strong>This
|
7990
5175
|
* method is experimental and may change.</strong>
|
7991
5176
|
* @returns A new client secret
|
7992
5177
|
*/
|
7993
5178
|
public generateClientSecret(): string {
|
7994
|
-
return
|
5179
|
+
return secureRandomString(32);
|
7995
5180
|
}
|
7996
5181
|
|
7997
5182
|
/**
|
@@ -8000,15 +5185,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
8000
5185
|
* @returns A decryption promise
|
8001
5186
|
*/
|
8002
5187
|
public decryptEventIfNeeded(event: MatrixEvent, options?: IDecryptOptions): Promise<void> {
|
8003
|
-
|
8004
|
-
event.attemptDecryption(this.cryptoBackend!, options);
|
8005
|
-
}
|
8006
|
-
|
8007
|
-
if (event.isBeingDecrypted()) {
|
8008
|
-
return event.getDecryptionPromise()!;
|
8009
|
-
} else {
|
8010
|
-
return Promise.resolve();
|
8011
|
-
}
|
5188
|
+
return Promise.resolve();
|
8012
5189
|
}
|
8013
5190
|
|
8014
5191
|
private termsUrlForService(serviceType: SERVICE_TYPES, baseUrl: string): URL {
|
@@ -8239,27 +5416,33 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
8239
5416
|
/**
|
8240
5417
|
* @returns Promise which resolves to a LoginResponse object
|
8241
5418
|
* @returns Rejects: with an error response.
|
5419
|
+
*
|
5420
|
+
* @deprecated This method has unintuitive behaviour: it updates the `MatrixClient` instance with *some* of the
|
5421
|
+
* returned credentials. Instead, call {@link loginRequest} and create a new `MatrixClient` instance using the
|
5422
|
+
* results. See https://github.com/matrix-org/matrix-js-sdk/issues/4502.
|
8242
5423
|
*/
|
8243
5424
|
public login(loginType: LoginRequest["type"], data: Omit<LoginRequest, "type">): Promise<LoginResponse> {
|
8244
|
-
return this.
|
8245
|
-
|
8246
|
-
|
8247
|
-
|
8248
|
-
|
8249
|
-
|
8250
|
-
|
8251
|
-
|
8252
|
-
|
8253
|
-
|
8254
|
-
|
8255
|
-
|
8256
|
-
return response;
|
8257
|
-
});
|
5425
|
+
return this.loginRequest({
|
5426
|
+
...data,
|
5427
|
+
type: loginType,
|
5428
|
+
}).then((response) => {
|
5429
|
+
if (response.access_token && response.user_id) {
|
5430
|
+
this.http.opts.accessToken = response.access_token;
|
5431
|
+
this.credentials = {
|
5432
|
+
userId: response.user_id,
|
5433
|
+
};
|
5434
|
+
}
|
5435
|
+
return response;
|
5436
|
+
});
|
8258
5437
|
}
|
8259
5438
|
|
8260
5439
|
/**
|
8261
5440
|
* @returns Promise which resolves to a LoginResponse object
|
8262
5441
|
* @returns Rejects: with an error response.
|
5442
|
+
*
|
5443
|
+
* @deprecated This method has unintuitive behaviour: it updates the `MatrixClient` instance with *some* of the
|
5444
|
+
* returned credentials. Instead, call {@link loginRequest} with `data.type: "m.login.password"`, and create a new
|
5445
|
+
* `MatrixClient` instance using the results. See https://github.com/matrix-org/matrix-js-sdk/issues/4502.
|
8263
5446
|
*/
|
8264
5447
|
public loginWithPassword(user: string, password: string): Promise<LoginResponse> {
|
8265
5448
|
return this.login("m.login.password", {
|
@@ -8304,6 +5487,10 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
8304
5487
|
* @param token - Login token previously received from homeserver
|
8305
5488
|
* @returns Promise which resolves to a LoginResponse object
|
8306
5489
|
* @returns Rejects: with an error response.
|
5490
|
+
*
|
5491
|
+
* @deprecated This method has unintuitive behaviour: it updates the `MatrixClient` instance with *some* of the
|
5492
|
+
* returned credentials. Instead, call {@link loginRequest} with `data.type: "m.login.token"`, and create a new
|
5493
|
+
* `MatrixClient` instance using the results. See https://github.com/matrix-org/matrix-js-sdk/issues/4502.
|
8307
5494
|
*/
|
8308
5495
|
public loginWithToken(token: string): Promise<LoginResponse> {
|
8309
5496
|
return this.login("m.login.token", {
|
@@ -8311,6 +5498,20 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
8311
5498
|
});
|
8312
5499
|
}
|
8313
5500
|
|
5501
|
+
/**
|
5502
|
+
* Sends a `POST /login` request to the server.
|
5503
|
+
*
|
5504
|
+
* If successful, this will create a new device and access token for the user.
|
5505
|
+
*
|
5506
|
+
* @see {@link MatrixClient.loginFlows} which makes a `GET /login` request.
|
5507
|
+
* @see https://spec.matrix.org/v1.13/client-server-api/#post_matrixclientv3login
|
5508
|
+
*
|
5509
|
+
* @param data - Credentials and other details for the login request.
|
5510
|
+
*/
|
5511
|
+
public async loginRequest(data: LoginRequest): Promise<LoginResponse> {
|
5512
|
+
return await this.http.authedRequest<LoginResponse>(Method.Post, "/login", undefined, data);
|
5513
|
+
}
|
5514
|
+
|
8314
5515
|
/**
|
8315
5516
|
* Logs out the current session.
|
8316
5517
|
* Obviously, further calls that require authorisation should fail after this
|
@@ -8321,17 +5522,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
8321
5522
|
* @returns Promise which resolves: On success, the empty object `{}`
|
8322
5523
|
*/
|
8323
5524
|
public async logout(stopClient = false): Promise<{}> {
|
8324
|
-
if (this.crypto?.backupManager?.getKeyBackupEnabled()) {
|
8325
|
-
try {
|
8326
|
-
while ((await this.crypto.backupManager.backupPendingKeys(200)) > 0);
|
8327
|
-
} catch (err) {
|
8328
|
-
this.logger.error(
|
8329
|
-
"Key backup request failed when logging out. Some keys may be missing from backup",
|
8330
|
-
err,
|
8331
|
-
);
|
8332
|
-
}
|
8333
|
-
}
|
8334
|
-
|
8335
5525
|
if (stopClient) {
|
8336
5526
|
this.stopClient();
|
8337
5527
|
this.http.abort();
|
@@ -9262,7 +6452,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
9262
6452
|
deviceId: string,
|
9263
6453
|
notificationSettings: LocalNotificationSettings,
|
9264
6454
|
): Promise<{}> {
|
9265
|
-
const key = `${LOCAL_NOTIFICATION_SETTINGS_PREFIX.name}.${deviceId}
|
6455
|
+
const key = `${LOCAL_NOTIFICATION_SETTINGS_PREFIX.name}.${deviceId}` as const;
|
9266
6456
|
return this.setAccountData(key, notificationSettings);
|
9267
6457
|
}
|
9268
6458
|
|
@@ -9376,87 +6566,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
9376
6566
|
return this.http.authedRequest(Method.Post, "/search", queryParams, body, { abortSignal });
|
9377
6567
|
}
|
9378
6568
|
|
9379
|
-
/**
|
9380
|
-
* Upload keys
|
9381
|
-
*
|
9382
|
-
* @param content - body of upload request
|
9383
|
-
*
|
9384
|
-
* @param opts - this method no longer takes any opts,
|
9385
|
-
* used to take opts.device_id but this was not removed from the spec as a redundant parameter
|
9386
|
-
*
|
9387
|
-
* @returns Promise which resolves: result object. Rejects: with
|
9388
|
-
* an error response ({@link MatrixError}).
|
9389
|
-
*/
|
9390
|
-
public uploadKeysRequest(content: IUploadKeysRequest, opts?: void): Promise<IKeysUploadResponse> {
|
9391
|
-
return this.http.authedRequest(Method.Post, "/keys/upload", undefined, content);
|
9392
|
-
}
|
9393
|
-
|
9394
|
-
public uploadKeySignatures(content: KeySignatures): Promise<IUploadKeySignaturesResponse> {
|
9395
|
-
return this.http.authedRequest(Method.Post, "/keys/signatures/upload", undefined, content);
|
9396
|
-
}
|
9397
|
-
|
9398
|
-
/**
|
9399
|
-
* Download device keys
|
9400
|
-
*
|
9401
|
-
* @param userIds - list of users to get keys for
|
9402
|
-
*
|
9403
|
-
* @param token - sync token to pass in the query request, to help
|
9404
|
-
* the HS give the most recent results
|
9405
|
-
*
|
9406
|
-
* @returns Promise which resolves: result object. Rejects: with
|
9407
|
-
* an error response ({@link MatrixError}).
|
9408
|
-
*/
|
9409
|
-
public downloadKeysForUsers(userIds: string[], { token }: { token?: string } = {}): Promise<IDownloadKeyResult> {
|
9410
|
-
const content: IQueryKeysRequest = {
|
9411
|
-
device_keys: {},
|
9412
|
-
};
|
9413
|
-
if (token !== undefined) {
|
9414
|
-
content.token = token;
|
9415
|
-
}
|
9416
|
-
userIds.forEach((u) => {
|
9417
|
-
content.device_keys[u] = [];
|
9418
|
-
});
|
9419
|
-
|
9420
|
-
return this.http.authedRequest(Method.Post, "/keys/query", undefined, content);
|
9421
|
-
}
|
9422
|
-
|
9423
|
-
/**
|
9424
|
-
* Claim one-time keys
|
9425
|
-
*
|
9426
|
-
* @param devices - a list of [userId, deviceId] pairs
|
9427
|
-
*
|
9428
|
-
* @param keyAlgorithm - desired key type
|
9429
|
-
*
|
9430
|
-
* @param timeout - the time (in milliseconds) to wait for keys from remote
|
9431
|
-
* servers
|
9432
|
-
*
|
9433
|
-
* @returns Promise which resolves: result object. Rejects: with
|
9434
|
-
* an error response ({@link MatrixError}).
|
9435
|
-
*/
|
9436
|
-
public claimOneTimeKeys(
|
9437
|
-
devices: [string, string][],
|
9438
|
-
keyAlgorithm = "signed_curve25519",
|
9439
|
-
timeout?: number,
|
9440
|
-
): Promise<IClaimOTKsResult> {
|
9441
|
-
const queries: Record<string, Record<string, string>> = {};
|
9442
|
-
|
9443
|
-
if (keyAlgorithm === undefined) {
|
9444
|
-
keyAlgorithm = "signed_curve25519";
|
9445
|
-
}
|
9446
|
-
|
9447
|
-
for (const [userId, deviceId] of devices) {
|
9448
|
-
const query = queries[userId] || {};
|
9449
|
-
safeSet(queries, userId, query);
|
9450
|
-
safeSet(query, deviceId, keyAlgorithm);
|
9451
|
-
}
|
9452
|
-
const content: IClaimKeysRequest = { one_time_keys: queries };
|
9453
|
-
if (timeout) {
|
9454
|
-
content.timeout = timeout;
|
9455
|
-
}
|
9456
|
-
const path = "/keys/claim";
|
9457
|
-
return this.http.authedRequest(Method.Post, path, undefined, content);
|
9458
|
-
}
|
9459
|
-
|
9460
6569
|
/**
|
9461
6570
|
* Ask the server for a list of users who have changed their device lists
|
9462
6571
|
* between a pair of sync tokens
|
@@ -9474,15 +6583,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
9474
6583
|
return this.http.authedRequest(Method.Get, "/keys/changes", qps);
|
9475
6584
|
}
|
9476
6585
|
|
9477
|
-
public uploadDeviceSigningKeys(auth?: AuthDict, keys?: CrossSigningKeys): Promise<{}> {
|
9478
|
-
// API returns empty object
|
9479
|
-
const data = Object.assign({}, keys);
|
9480
|
-
if (auth) Object.assign(data, { auth });
|
9481
|
-
return this.http.authedRequest(Method.Post, "/keys/device_signing/upload", undefined, data, {
|
9482
|
-
prefix: ClientPrefix.Unstable,
|
9483
|
-
});
|
9484
|
-
}
|
9485
|
-
|
9486
6586
|
/**
|
9487
6587
|
* Register with an identity server using the OpenID token from the user's
|
9488
6588
|
* Homeserver, which can be retrieved via
|
@@ -9810,10 +6910,10 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
9810
6910
|
identityAccessToken: string,
|
9811
6911
|
): Promise<
|
9812
6912
|
| {
|
9813
|
-
|
9814
|
-
|
9815
|
-
|
9816
|
-
|
6913
|
+
address: string;
|
6914
|
+
medium: string;
|
6915
|
+
mxid: string;
|
6916
|
+
}
|
9817
6917
|
| {}
|
9818
6918
|
> {
|
9819
6919
|
// Note: we're using the V2 API by calling this function, but our
|
@@ -10111,13 +7211,6 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
10111
7211
|
[UNSTABLE_MSC3088_ENABLED.name]: true,
|
10112
7212
|
},
|
10113
7213
|
},
|
10114
|
-
{
|
10115
|
-
type: EventType.RoomEncryption,
|
10116
|
-
state_key: "",
|
10117
|
-
content: {
|
10118
|
-
algorithm: olmlib.MEGOLM_ALGORITHM,
|
10119
|
-
},
|
10120
|
-
},
|
10121
7214
|
],
|
10122
7215
|
});
|
10123
7216
|
return new MSC3089TreeSpace(this, roomId);
|
@@ -10321,6 +7414,7 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
10321
7414
|
* @returns Resolves: A promise of an object containing the OIDC issuer if configured
|
10322
7415
|
* @returns Rejects: when the request fails (module:http-api.MatrixError)
|
10323
7416
|
* @experimental - part of MSC2965
|
7417
|
+
* @deprecated in favour of getAuthMetadata
|
10324
7418
|
*/
|
10325
7419
|
public async getAuthIssuer(): Promise<{
|
10326
7420
|
issuer: string;
|
@@ -10329,6 +7423,33 @@ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHa
|
|
10329
7423
|
prefix: ClientPrefix.Unstable + "/org.matrix.msc2965",
|
10330
7424
|
});
|
10331
7425
|
}
|
7426
|
+
|
7427
|
+
/**
|
7428
|
+
* Discover and validate delegated auth configuration
|
7429
|
+
* - delegated auth issuer openid-configuration is reachable
|
7430
|
+
* - delegated auth issuer openid-configuration is configured correctly for us
|
7431
|
+
* Fetches /auth_metadata falling back to legacy implementation using /auth_issuer followed by
|
7432
|
+
* https://oidc-issuer.example.com/.well-known/openid-configuration and other files linked therein.
|
7433
|
+
* When successful, validated metadata is returned
|
7434
|
+
* @returns validated authentication metadata and optionally signing keys
|
7435
|
+
* @throws when delegated auth config is invalid or unreachable
|
7436
|
+
* @experimental - part of MSC2965
|
7437
|
+
*/
|
7438
|
+
public async getAuthMetadata(): Promise<OidcClientConfig> {
|
7439
|
+
let authMetadata: unknown | undefined;
|
7440
|
+
try {
|
7441
|
+
authMetadata = await this.http.request<unknown>(Method.Get, "/auth_metadata", undefined, undefined, {
|
7442
|
+
prefix: ClientPrefix.Unstable + "/org.matrix.msc2965",
|
7443
|
+
});
|
7444
|
+
} catch (e) {
|
7445
|
+
if (e instanceof MatrixError && e.errcode === "M_UNRECOGNIZED") {
|
7446
|
+
const { issuer } = await this.getAuthIssuer();
|
7447
|
+
return discoverAndValidateOIDCIssuerWellKnown(issuer);
|
7448
|
+
}
|
7449
|
+
throw e;
|
7450
|
+
}
|
7451
|
+
return validateAuthMetadataAndKeys(authMetadata);
|
7452
|
+
}
|
10332
7453
|
}
|
10333
7454
|
|
10334
7455
|
function getUnstableDelayQueryOpts(delayOpts: SendDelayedEventRequestOpts): QueryDict {
|
@@ -10337,88 +7458,6 @@ function getUnstableDelayQueryOpts(delayOpts: SendDelayedEventRequestOpts): Quer
|
|
10337
7458
|
);
|
10338
7459
|
}
|
10339
7460
|
|
10340
|
-
/**
|
10341
|
-
* recalculates an accurate notifications count on event decryption.
|
10342
|
-
* Servers do not have enough knowledge about encrypted events to calculate an
|
10343
|
-
* accurate notification_count
|
10344
|
-
*/
|
10345
|
-
export function fixNotificationCountOnDecryption(cli: MatrixClient, event: MatrixEvent): void {
|
10346
|
-
const ourUserId = cli.getUserId();
|
10347
|
-
const eventId = event.getId();
|
10348
|
-
|
10349
|
-
const room = cli.getRoom(event.getRoomId());
|
10350
|
-
if (!room || !ourUserId || !eventId) return;
|
10351
|
-
|
10352
|
-
// Due to threads, we can get relation events (eg. edits & reactions) that never get
|
10353
|
-
// added to a timeline and so cannot be found in their own room (their edit / reaction
|
10354
|
-
// still applies to the event it needs to, so it doesn't matter too much). However, if
|
10355
|
-
// we try to process notification about this event, we'll get very confused because we
|
10356
|
-
// won't be able to find the event in the room, so will assume it must be unread, even
|
10357
|
-
// if it's actually read. We therefore skip anything that isn't in the room. This isn't
|
10358
|
-
// *great*, so if we can fix the homeless events (eg. with MSC4023) then we should probably
|
10359
|
-
// remove this workaround.
|
10360
|
-
if (!room.findEventById(eventId)) {
|
10361
|
-
logger.info(`Decrypted event ${event.getId()} is not in room ${room.roomId}: ignoring`);
|
10362
|
-
return;
|
10363
|
-
}
|
10364
|
-
|
10365
|
-
const isThreadEvent = !!event.threadRootId && !event.isThreadRoot;
|
10366
|
-
|
10367
|
-
let hasReadEvent;
|
10368
|
-
if (isThreadEvent) {
|
10369
|
-
const thread = room.getThread(event.threadRootId);
|
10370
|
-
hasReadEvent = thread
|
10371
|
-
? thread.hasUserReadEvent(ourUserId, eventId)
|
10372
|
-
: // If the thread object does not exist in the room yet, we don't
|
10373
|
-
// want to calculate notification for this event yet. We have not
|
10374
|
-
// restored the read receipts yet and can't accurately calculate
|
10375
|
-
// notifications at this stage.
|
10376
|
-
//
|
10377
|
-
// This issue can likely go away when MSC3874 is implemented
|
10378
|
-
true;
|
10379
|
-
} else {
|
10380
|
-
hasReadEvent = room.hasUserReadEvent(ourUserId, eventId);
|
10381
|
-
}
|
10382
|
-
|
10383
|
-
if (hasReadEvent) {
|
10384
|
-
// If the event has been read, ignore it.
|
10385
|
-
return;
|
10386
|
-
}
|
10387
|
-
|
10388
|
-
const actions = cli.getPushActionsForEvent(event, true);
|
10389
|
-
|
10390
|
-
// Ensure the unread counts are kept up to date if the event is encrypted
|
10391
|
-
// We also want to make sure that the notification count goes up if we already
|
10392
|
-
// have encrypted events to avoid other code from resetting 'highlight' to zero.
|
10393
|
-
const newHighlight = !!actions?.tweaks?.highlight;
|
10394
|
-
|
10395
|
-
if (newHighlight) {
|
10396
|
-
// TODO: Handle mentions received while the client is offline
|
10397
|
-
// See also https://github.com/vector-im/element-web/issues/9069
|
10398
|
-
const newCount = room.getUnreadCountForEventContext(NotificationCountType.Highlight, event) + 1;
|
10399
|
-
if (isThreadEvent) {
|
10400
|
-
room.setThreadUnreadNotificationCount(event.threadRootId, NotificationCountType.Highlight, newCount);
|
10401
|
-
} else {
|
10402
|
-
room.setUnreadNotificationCount(NotificationCountType.Highlight, newCount);
|
10403
|
-
}
|
10404
|
-
}
|
10405
|
-
|
10406
|
-
// `notify` is used in practice for incrementing the total count
|
10407
|
-
const newNotify = !!actions?.notify;
|
10408
|
-
|
10409
|
-
// The room total count is NEVER incremented by the server for encrypted rooms. We basically ignore
|
10410
|
-
// the server here as it's always going to tell us to increment for encrypted events.
|
10411
|
-
if (newNotify) {
|
10412
|
-
// Total count is used to typically increment a room notification counter, but not loudly highlight it.
|
10413
|
-
const newCount = room.getUnreadCountForEventContext(NotificationCountType.Total, event) + 1;
|
10414
|
-
if (isThreadEvent) {
|
10415
|
-
room.setThreadUnreadNotificationCount(event.threadRootId, NotificationCountType.Total, newCount);
|
10416
|
-
} else {
|
10417
|
-
room.setUnreadNotificationCount(NotificationCountType.Total, newCount);
|
10418
|
-
}
|
10419
|
-
}
|
10420
|
-
}
|
10421
|
-
|
10422
7461
|
/**
|
10423
7462
|
* Given an event, figure out the thread ID we should use for it in a receipt.
|
10424
7463
|
*
|