@unwanted/matrix-sdk-mini 34.12.0 → 36.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/git-revision.txt +1 -1
- package/lib/@types/event.d.ts +25 -19
- package/lib/@types/event.d.ts.map +1 -1
- package/lib/@types/event.js +5 -0
- package/lib/@types/event.js.map +1 -1
- package/lib/@types/global.d.js +0 -2
- package/lib/@types/global.d.js.map +1 -1
- package/lib/autodiscovery.d.ts +1 -1
- package/lib/autodiscovery.d.ts.map +1 -1
- package/lib/autodiscovery.js.map +1 -1
- package/lib/base64.d.ts +3 -6
- package/lib/base64.d.ts.map +1 -1
- package/lib/base64.js +43 -36
- package/lib/base64.js.map +1 -1
- package/lib/browser-index.d.ts.map +1 -1
- package/lib/browser-index.js +0 -11
- package/lib/browser-index.js.map +1 -1
- package/lib/client.d.ts +45 -1306
- package/lib/client.d.ts.map +1 -1
- package/lib/client.js +406 -2963
- package/lib/client.js.map +1 -1
- package/lib/digest.d.ts +2 -2
- package/lib/digest.d.ts.map +1 -1
- package/lib/digest.js +2 -2
- package/lib/digest.js.map +1 -1
- package/lib/embedded.d.ts +2 -23
- package/lib/embedded.d.ts.map +1 -1
- package/lib/embedded.js +82 -209
- package/lib/embedded.js.map +1 -1
- package/lib/event-mapper.d.ts.map +1 -1
- package/lib/event-mapper.js +0 -4
- package/lib/event-mapper.js.map +1 -1
- package/lib/feature.d.ts.map +1 -1
- package/lib/feature.js +2 -1
- package/lib/feature.js.map +1 -1
- package/lib/http-api/errors.d.ts +3 -3
- package/lib/http-api/errors.js +3 -3
- package/lib/http-api/errors.js.map +1 -1
- package/lib/http-api/utils.js +2 -2
- package/lib/http-api/utils.js.map +1 -1
- package/lib/matrix.d.ts +0 -25
- package/lib/matrix.d.ts.map +1 -1
- package/lib/matrix.js +1 -30
- package/lib/matrix.js.map +1 -1
- package/lib/models/MSC3089Branch.d.ts.map +1 -1
- package/lib/models/MSC3089Branch.js +0 -3
- package/lib/models/MSC3089Branch.js.map +1 -1
- package/lib/models/event-timeline-set.d.ts +6 -10
- package/lib/models/event-timeline-set.d.ts.map +1 -1
- package/lib/models/event-timeline-set.js +28 -36
- package/lib/models/event-timeline-set.js.map +1 -1
- package/lib/models/event-timeline.d.ts +7 -2
- package/lib/models/event-timeline.d.ts.map +1 -1
- package/lib/models/event-timeline.js +9 -30
- package/lib/models/event-timeline.js.map +1 -1
- package/lib/models/event.d.ts +12 -96
- package/lib/models/event.d.ts.map +1 -1
- package/lib/models/event.js +59 -286
- package/lib/models/event.js.map +1 -1
- package/lib/models/invites-ignorer-types.d.ts +27 -0
- package/lib/models/invites-ignorer-types.d.ts.map +1 -0
- package/lib/models/invites-ignorer-types.js +36 -0
- package/lib/models/invites-ignorer-types.js.map +1 -0
- package/lib/models/invites-ignorer.d.ts +2 -26
- package/lib/models/invites-ignorer.d.ts.map +1 -1
- package/lib/models/invites-ignorer.js +2 -27
- package/lib/models/invites-ignorer.js.map +1 -1
- package/lib/models/poll.d.ts.map +1 -1
- package/lib/models/poll.js +1 -5
- package/lib/models/poll.js.map +1 -1
- package/lib/models/relations-container.d.ts.map +1 -1
- package/lib/models/relations-container.js +1 -7
- package/lib/models/relations-container.js.map +1 -1
- package/lib/models/relations.d.ts +0 -1
- package/lib/models/relations.d.ts.map +1 -1
- package/lib/models/relations.js +0 -8
- package/lib/models/relations.js.map +1 -1
- package/lib/models/room-member.d.ts +6 -1
- package/lib/models/room-member.d.ts.map +1 -1
- package/lib/models/room-member.js +7 -1
- package/lib/models/room-member.js.map +1 -1
- package/lib/models/room-state.d.ts +2 -13
- package/lib/models/room-state.d.ts.map +1 -1
- package/lib/models/room-state.js +12 -56
- package/lib/models/room-state.js.map +1 -1
- package/lib/models/room.d.ts +8 -21
- package/lib/models/room.d.ts.map +1 -1
- package/lib/models/room.js +128 -163
- package/lib/models/room.js.map +1 -1
- package/lib/models/thread.d.ts.map +1 -1
- package/lib/models/thread.js +5 -4
- package/lib/models/thread.js.map +1 -1
- package/lib/oidc/authorize.d.ts +2 -2
- package/lib/oidc/authorize.d.ts.map +1 -1
- package/lib/oidc/authorize.js +5 -5
- package/lib/oidc/authorize.js.map +1 -1
- package/lib/oidc/discovery.d.ts +8 -0
- package/lib/oidc/discovery.d.ts.map +1 -1
- package/lib/oidc/discovery.js +22 -11
- package/lib/oidc/discovery.js.map +1 -1
- package/lib/oidc/index.d.ts +3 -4
- package/lib/oidc/index.d.ts.map +1 -1
- package/lib/oidc/index.js.map +1 -1
- package/lib/oidc/register.js +3 -3
- package/lib/oidc/register.js.map +1 -1
- package/lib/oidc/tokenRefresher.d.ts.map +1 -1
- package/lib/oidc/tokenRefresher.js +6 -5
- package/lib/oidc/tokenRefresher.js.map +1 -1
- package/lib/oidc/validate.d.ts +9 -23
- package/lib/oidc/validate.d.ts.map +1 -1
- package/lib/oidc/validate.js +13 -28
- package/lib/oidc/validate.js.map +1 -1
- package/lib/randomstring.d.ts +30 -3
- package/lib/randomstring.d.ts.map +1 -1
- package/lib/randomstring.js +68 -16
- package/lib/randomstring.js.map +1 -1
- package/lib/sliding-sync-sdk.d.ts +3 -4
- package/lib/sliding-sync-sdk.d.ts.map +1 -1
- package/lib/sliding-sync-sdk.js +55 -102
- package/lib/sliding-sync-sdk.js.map +1 -1
- package/lib/sliding-sync.js +9 -6
- package/lib/sliding-sync.js.map +1 -1
- package/lib/store/indexeddb-local-backend.js +4 -2
- package/lib/store/indexeddb-local-backend.js.map +1 -1
- package/lib/store/indexeddb.d.ts +1 -1
- package/lib/store/indexeddb.d.ts.map +1 -1
- package/lib/store/indexeddb.js.map +1 -1
- package/lib/sync-accumulator.d.ts +6 -4
- package/lib/sync-accumulator.d.ts.map +1 -1
- package/lib/sync-accumulator.js +23 -12
- package/lib/sync-accumulator.js.map +1 -1
- package/lib/sync.d.ts +10 -13
- package/lib/sync.d.ts.map +1 -1
- package/lib/sync.js +94 -115
- package/lib/sync.js.map +1 -1
- package/lib/testing.d.ts +13 -44
- package/lib/testing.d.ts.map +1 -1
- package/lib/testing.js +36 -99
- package/lib/testing.js.map +1 -1
- package/lib/types.d.ts +0 -1
- package/lib/types.d.ts.map +1 -1
- package/lib/types.js.map +1 -1
- package/package.json +14 -15
- package/src/@types/event.ts +19 -36
- package/src/@types/global.d.ts +21 -4
- package/src/autodiscovery.ts +1 -1
- package/src/base64.ts +38 -40
- package/src/browser-index.ts +0 -11
- package/src/client.ts +175 -3136
- package/src/digest.ts +3 -3
- package/src/embedded.ts +43 -149
- package/src/event-mapper.ts +0 -4
- package/src/feature.ts +1 -0
- package/src/http-api/errors.ts +3 -3
- package/src/http-api/utils.ts +2 -2
- package/src/matrix.ts +0 -41
- package/src/models/MSC3089Branch.ts +0 -3
- package/src/models/event-timeline-set.ts +17 -38
- package/src/models/event-timeline.ts +11 -26
- package/src/models/event.ts +54 -295
- package/src/models/invites-ignorer-types.ts +48 -0
- package/src/models/invites-ignorer.ts +7 -42
- package/src/models/poll.ts +0 -6
- package/src/models/relations-container.ts +1 -8
- package/src/models/relations.ts +0 -8
- package/src/models/room-member.ts +16 -1
- package/src/models/room-state.ts +4 -37
- package/src/models/room.ts +34 -69
- package/src/models/thread.ts +4 -3
- package/src/oidc/authorize.ts +7 -7
- package/src/oidc/discovery.ts +16 -10
- package/src/oidc/index.ts +3 -4
- package/src/oidc/register.ts +3 -3
- package/src/oidc/tokenRefresher.ts +3 -2
- package/src/oidc/validate.ts +40 -63
- package/src/randomstring.ts +65 -19
- package/src/sliding-sync-sdk.ts +10 -83
- package/src/sliding-sync.ts +6 -6
- package/src/store/indexeddb-local-backend.ts +2 -2
- package/src/store/indexeddb.ts +1 -1
- package/src/sync-accumulator.ts +33 -16
- package/src/sync.ts +112 -143
- package/src/testing.ts +36 -103
- package/src/types.ts +0 -1
- package/CHANGELOG.md +0 -5910
- package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
- package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
- package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
- package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
- package/lib/@types/crypto.d.ts +0 -47
- package/lib/@types/crypto.d.ts.map +0 -1
- package/lib/@types/crypto.js +0 -1
- package/lib/@types/crypto.js.map +0 -1
- package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
- package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
- package/lib/common-crypto/CryptoBackend.d.ts +0 -240
- package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
- package/lib/common-crypto/CryptoBackend.js +0 -73
- package/lib/common-crypto/CryptoBackend.js.map +0 -1
- package/lib/common-crypto/key-passphrase.d.ts +0 -14
- package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
- package/lib/common-crypto/key-passphrase.js +0 -33
- package/lib/common-crypto/key-passphrase.js.map +0 -1
- package/lib/crypto/CrossSigning.d.ts +0 -184
- package/lib/crypto/CrossSigning.d.ts.map +0 -1
- package/lib/crypto/CrossSigning.js +0 -718
- package/lib/crypto/CrossSigning.js.map +0 -1
- package/lib/crypto/DeviceList.d.ts +0 -216
- package/lib/crypto/DeviceList.d.ts.map +0 -1
- package/lib/crypto/DeviceList.js +0 -892
- package/lib/crypto/DeviceList.js.map +0 -1
- package/lib/crypto/EncryptionSetup.d.ts +0 -152
- package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
- package/lib/crypto/EncryptionSetup.js +0 -356
- package/lib/crypto/EncryptionSetup.js.map +0 -1
- package/lib/crypto/OlmDevice.d.ts +0 -457
- package/lib/crypto/OlmDevice.d.ts.map +0 -1
- package/lib/crypto/OlmDevice.js +0 -1241
- package/lib/crypto/OlmDevice.js.map +0 -1
- package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
- package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
- package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
- package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
- package/lib/crypto/RoomList.d.ts +0 -26
- package/lib/crypto/RoomList.d.ts.map +0 -1
- package/lib/crypto/RoomList.js +0 -71
- package/lib/crypto/RoomList.js.map +0 -1
- package/lib/crypto/SecretSharing.d.ts +0 -24
- package/lib/crypto/SecretSharing.d.ts.map +0 -1
- package/lib/crypto/SecretSharing.js +0 -194
- package/lib/crypto/SecretSharing.js.map +0 -1
- package/lib/crypto/SecretStorage.d.ts +0 -55
- package/lib/crypto/SecretStorage.d.ts.map +0 -1
- package/lib/crypto/SecretStorage.js +0 -118
- package/lib/crypto/SecretStorage.js.map +0 -1
- package/lib/crypto/aes.d.ts +0 -6
- package/lib/crypto/aes.d.ts.map +0 -1
- package/lib/crypto/aes.js +0 -24
- package/lib/crypto/aes.js.map +0 -1
- package/lib/crypto/algorithms/base.d.ts +0 -156
- package/lib/crypto/algorithms/base.d.ts.map +0 -1
- package/lib/crypto/algorithms/base.js +0 -187
- package/lib/crypto/algorithms/base.js.map +0 -1
- package/lib/crypto/algorithms/index.d.ts +0 -4
- package/lib/crypto/algorithms/index.d.ts.map +0 -1
- package/lib/crypto/algorithms/index.js +0 -20
- package/lib/crypto/algorithms/index.js.map +0 -1
- package/lib/crypto/algorithms/megolm.d.ts +0 -385
- package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
- package/lib/crypto/algorithms/megolm.js +0 -1822
- package/lib/crypto/algorithms/megolm.js.map +0 -1
- package/lib/crypto/algorithms/olm.d.ts +0 -5
- package/lib/crypto/algorithms/olm.d.ts.map +0 -1
- package/lib/crypto/algorithms/olm.js +0 -299
- package/lib/crypto/algorithms/olm.js.map +0 -1
- package/lib/crypto/api.d.ts +0 -32
- package/lib/crypto/api.d.ts.map +0 -1
- package/lib/crypto/api.js +0 -22
- package/lib/crypto/api.js.map +0 -1
- package/lib/crypto/backup.d.ts +0 -227
- package/lib/crypto/backup.d.ts.map +0 -1
- package/lib/crypto/backup.js +0 -824
- package/lib/crypto/backup.js.map +0 -1
- package/lib/crypto/crypto.d.ts +0 -3
- package/lib/crypto/crypto.d.ts.map +0 -1
- package/lib/crypto/crypto.js +0 -19
- package/lib/crypto/crypto.js.map +0 -1
- package/lib/crypto/dehydration.d.ts +0 -34
- package/lib/crypto/dehydration.d.ts.map +0 -1
- package/lib/crypto/dehydration.js +0 -252
- package/lib/crypto/dehydration.js.map +0 -1
- package/lib/crypto/device-converter.d.ts +0 -9
- package/lib/crypto/device-converter.d.ts.map +0 -1
- package/lib/crypto/device-converter.js +0 -42
- package/lib/crypto/device-converter.js.map +0 -1
- package/lib/crypto/deviceinfo.d.ts +0 -99
- package/lib/crypto/deviceinfo.d.ts.map +0 -1
- package/lib/crypto/deviceinfo.js +0 -148
- package/lib/crypto/deviceinfo.js.map +0 -1
- package/lib/crypto/index.d.ts +0 -1210
- package/lib/crypto/index.d.ts.map +0 -1
- package/lib/crypto/index.js +0 -4101
- package/lib/crypto/index.js.map +0 -1
- package/lib/crypto/key_passphrase.d.ts +0 -14
- package/lib/crypto/key_passphrase.d.ts.map +0 -1
- package/lib/crypto/key_passphrase.js +0 -44
- package/lib/crypto/key_passphrase.js.map +0 -1
- package/lib/crypto/keybackup.d.ts +0 -18
- package/lib/crypto/keybackup.d.ts.map +0 -1
- package/lib/crypto/keybackup.js +0 -1
- package/lib/crypto/keybackup.js.map +0 -1
- package/lib/crypto/olmlib.d.ts +0 -129
- package/lib/crypto/olmlib.d.ts.map +0 -1
- package/lib/crypto/olmlib.js +0 -492
- package/lib/crypto/olmlib.js.map +0 -1
- package/lib/crypto/recoverykey.d.ts +0 -2
- package/lib/crypto/recoverykey.d.ts.map +0 -1
- package/lib/crypto/recoverykey.js +0 -19
- package/lib/crypto/recoverykey.js.map +0 -1
- package/lib/crypto/store/base.d.ts +0 -252
- package/lib/crypto/store/base.d.ts.map +0 -1
- package/lib/crypto/store/base.js +0 -64
- package/lib/crypto/store/base.js.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
- package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
- package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
- package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
- package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
- package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
- package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/localStorage-crypto-store.js +0 -531
- package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
- package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
- package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/memory-crypto-store.js +0 -622
- package/lib/crypto/store/memory-crypto-store.js.map +0 -1
- package/lib/crypto/verification/Base.d.ts +0 -105
- package/lib/crypto/verification/Base.d.ts.map +0 -1
- package/lib/crypto/verification/Base.js +0 -372
- package/lib/crypto/verification/Base.js.map +0 -1
- package/lib/crypto/verification/Error.d.ts +0 -35
- package/lib/crypto/verification/Error.d.ts.map +0 -1
- package/lib/crypto/verification/Error.js +0 -86
- package/lib/crypto/verification/Error.js.map +0 -1
- package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
- package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
- package/lib/crypto/verification/IllegalMethod.js +0 -43
- package/lib/crypto/verification/IllegalMethod.js.map +0 -1
- package/lib/crypto/verification/QRCode.d.ts +0 -51
- package/lib/crypto/verification/QRCode.d.ts.map +0 -1
- package/lib/crypto/verification/QRCode.js +0 -277
- package/lib/crypto/verification/QRCode.js.map +0 -1
- package/lib/crypto/verification/SAS.d.ts +0 -27
- package/lib/crypto/verification/SAS.d.ts.map +0 -1
- package/lib/crypto/verification/SAS.js +0 -485
- package/lib/crypto/verification/SAS.js.map +0 -1
- package/lib/crypto/verification/SASDecimal.d.ts +0 -8
- package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
- package/lib/crypto/verification/SASDecimal.js +0 -34
- package/lib/crypto/verification/SASDecimal.js.map +0 -1
- package/lib/crypto/verification/request/Channel.d.ts +0 -18
- package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
- package/lib/crypto/verification/request/Channel.js +0 -1
- package/lib/crypto/verification/request/Channel.js.map +0 -1
- package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
- package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
- package/lib/crypto/verification/request/InRoomChannel.js +0 -351
- package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
- package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
- package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
- package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
- package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
- package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
- package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
- package/lib/crypto/verification/request/VerificationRequest.js +0 -937
- package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
- package/lib/crypto-api/CryptoEvent.d.ts +0 -69
- package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
- package/lib/crypto-api/CryptoEvent.js +0 -33
- package/lib/crypto-api/CryptoEvent.js.map +0 -1
- package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
- package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
- package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
- package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
- package/lib/crypto-api/index.d.ts +0 -978
- package/lib/crypto-api/index.d.ts.map +0 -1
- package/lib/crypto-api/index.js +0 -304
- package/lib/crypto-api/index.js.map +0 -1
- package/lib/crypto-api/key-passphrase.d.ts +0 -11
- package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
- package/lib/crypto-api/key-passphrase.js +0 -51
- package/lib/crypto-api/key-passphrase.js.map +0 -1
- package/lib/crypto-api/keybackup.d.ts +0 -88
- package/lib/crypto-api/keybackup.d.ts.map +0 -1
- package/lib/crypto-api/keybackup.js +0 -1
- package/lib/crypto-api/keybackup.js.map +0 -1
- package/lib/crypto-api/recovery-key.d.ts +0 -11
- package/lib/crypto-api/recovery-key.d.ts.map +0 -1
- package/lib/crypto-api/recovery-key.js +0 -65
- package/lib/crypto-api/recovery-key.js.map +0 -1
- package/lib/crypto-api/verification.d.ts +0 -344
- package/lib/crypto-api/verification.d.ts.map +0 -1
- package/lib/crypto-api/verification.js +0 -91
- package/lib/crypto-api/verification.js.map +0 -1
- package/lib/matrixrtc/CallMembership.d.ts +0 -66
- package/lib/matrixrtc/CallMembership.d.ts.map +0 -1
- package/lib/matrixrtc/CallMembership.js +0 -197
- package/lib/matrixrtc/CallMembership.js.map +0 -1
- package/lib/matrixrtc/LivekitFocus.d.ts +0 -16
- package/lib/matrixrtc/LivekitFocus.d.ts.map +0 -1
- package/lib/matrixrtc/LivekitFocus.js +0 -20
- package/lib/matrixrtc/LivekitFocus.js.map +0 -1
- package/lib/matrixrtc/MatrixRTCSession.d.ts +0 -295
- package/lib/matrixrtc/MatrixRTCSession.d.ts.map +0 -1
- package/lib/matrixrtc/MatrixRTCSession.js +0 -1043
- package/lib/matrixrtc/MatrixRTCSession.js.map +0 -1
- package/lib/matrixrtc/MatrixRTCSessionManager.d.ts +0 -40
- package/lib/matrixrtc/MatrixRTCSessionManager.d.ts.map +0 -1
- package/lib/matrixrtc/MatrixRTCSessionManager.js +0 -146
- package/lib/matrixrtc/MatrixRTCSessionManager.js.map +0 -1
- package/lib/matrixrtc/focus.d.ts +0 -10
- package/lib/matrixrtc/focus.d.ts.map +0 -1
- package/lib/matrixrtc/focus.js +0 -1
- package/lib/matrixrtc/focus.js.map +0 -1
- package/lib/matrixrtc/index.d.ts +0 -7
- package/lib/matrixrtc/index.d.ts.map +0 -1
- package/lib/matrixrtc/index.js +0 -21
- package/lib/matrixrtc/index.js.map +0 -1
- package/lib/matrixrtc/types.d.ts +0 -19
- package/lib/matrixrtc/types.d.ts.map +0 -1
- package/lib/matrixrtc/types.js +0 -1
- package/lib/matrixrtc/types.js.map +0 -1
- package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
- package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
- package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
- package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
- package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
- package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousChannel.js +0 -1
- package/lib/rendezvous/RendezvousChannel.js.map +0 -1
- package/lib/rendezvous/RendezvousCode.d.ts +0 -9
- package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousCode.js +0 -1
- package/lib/rendezvous/RendezvousCode.js.map +0 -1
- package/lib/rendezvous/RendezvousError.d.ts +0 -6
- package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousError.js +0 -23
- package/lib/rendezvous/RendezvousError.js.map +0 -1
- package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
- package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousFailureReason.js +0 -38
- package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
- package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
- package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousIntent.js +0 -22
- package/lib/rendezvous/RendezvousIntent.js.map +0 -1
- package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
- package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousTransport.js +0 -1
- package/lib/rendezvous/RendezvousTransport.js.map +0 -1
- package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
- package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
- package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
- package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
- package/lib/rendezvous/channels/index.d.ts +0 -2
- package/lib/rendezvous/channels/index.d.ts.map +0 -1
- package/lib/rendezvous/channels/index.js +0 -18
- package/lib/rendezvous/channels/index.js.map +0 -1
- package/lib/rendezvous/index.d.ts +0 -10
- package/lib/rendezvous/index.d.ts.map +0 -1
- package/lib/rendezvous/index.js +0 -23
- package/lib/rendezvous/index.js.map +0 -1
- package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
- package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
- package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
- package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
- package/lib/rendezvous/transports/index.d.ts +0 -2
- package/lib/rendezvous/transports/index.d.ts.map +0 -1
- package/lib/rendezvous/transports/index.js +0 -18
- package/lib/rendezvous/transports/index.js.map +0 -1
- package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
- package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
- package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
- package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
- package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
- package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
- package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
- package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
- package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
- package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
- package/lib/rust-crypto/KeyClaimManager.js +0 -82
- package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
- package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
- package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
- package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
- package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
- package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
- package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
- package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
- package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
- package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
- package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
- package/lib/rust-crypto/RoomEncryptor.js +0 -299
- package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
- package/lib/rust-crypto/backup.d.ts +0 -254
- package/lib/rust-crypto/backup.d.ts.map +0 -1
- package/lib/rust-crypto/backup.js +0 -837
- package/lib/rust-crypto/backup.js.map +0 -1
- package/lib/rust-crypto/constants.d.ts +0 -3
- package/lib/rust-crypto/constants.d.ts.map +0 -1
- package/lib/rust-crypto/constants.js +0 -19
- package/lib/rust-crypto/constants.js.map +0 -1
- package/lib/rust-crypto/device-converter.d.ts +0 -28
- package/lib/rust-crypto/device-converter.d.ts.map +0 -1
- package/lib/rust-crypto/device-converter.js +0 -123
- package/lib/rust-crypto/device-converter.js.map +0 -1
- package/lib/rust-crypto/index.d.ts +0 -61
- package/lib/rust-crypto/index.d.ts.map +0 -1
- package/lib/rust-crypto/index.js +0 -152
- package/lib/rust-crypto/index.js.map +0 -1
- package/lib/rust-crypto/libolm_migration.d.ts +0 -81
- package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
- package/lib/rust-crypto/libolm_migration.js +0 -459
- package/lib/rust-crypto/libolm_migration.js.map +0 -1
- package/lib/rust-crypto/rust-crypto.d.ts +0 -556
- package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
- package/lib/rust-crypto/rust-crypto.js +0 -2016
- package/lib/rust-crypto/rust-crypto.js.map +0 -1
- package/lib/rust-crypto/secret-storage.d.ts +0 -22
- package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
- package/lib/rust-crypto/secret-storage.js +0 -63
- package/lib/rust-crypto/secret-storage.js.map +0 -1
- package/lib/rust-crypto/verification.d.ts +0 -319
- package/lib/rust-crypto/verification.d.ts.map +0 -1
- package/lib/rust-crypto/verification.js +0 -816
- package/lib/rust-crypto/verification.js.map +0 -1
- package/lib/secret-storage.d.ts +0 -370
- package/lib/secret-storage.d.ts.map +0 -1
- package/lib/secret-storage.js +0 -466
- package/lib/secret-storage.js.map +0 -1
- package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
- package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
- package/lib/utils/decryptAESSecretStorageItem.js +0 -50
- package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
- package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
- package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
- package/lib/utils/encryptAESSecretStorageItem.js +0 -68
- package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
- package/lib/utils/internal/deriveKeys.d.ts +0 -10
- package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
- package/lib/utils/internal/deriveKeys.js +0 -60
- package/lib/utils/internal/deriveKeys.js.map +0 -1
- package/lib/webrtc/audioContext.d.ts +0 -15
- package/lib/webrtc/audioContext.d.ts.map +0 -1
- package/lib/webrtc/audioContext.js +0 -46
- package/lib/webrtc/audioContext.js.map +0 -1
- package/lib/webrtc/call.d.ts +0 -560
- package/lib/webrtc/call.d.ts.map +0 -1
- package/lib/webrtc/call.js +0 -2541
- package/lib/webrtc/call.js.map +0 -1
- package/lib/webrtc/callEventHandler.d.ts +0 -37
- package/lib/webrtc/callEventHandler.d.ts.map +0 -1
- package/lib/webrtc/callEventHandler.js +0 -344
- package/lib/webrtc/callEventHandler.js.map +0 -1
- package/lib/webrtc/callEventTypes.d.ts +0 -73
- package/lib/webrtc/callEventTypes.d.ts.map +0 -1
- package/lib/webrtc/callEventTypes.js +0 -13
- package/lib/webrtc/callEventTypes.js.map +0 -1
- package/lib/webrtc/callFeed.d.ts +0 -128
- package/lib/webrtc/callFeed.d.ts.map +0 -1
- package/lib/webrtc/callFeed.js +0 -289
- package/lib/webrtc/callFeed.js.map +0 -1
- package/lib/webrtc/groupCall.d.ts +0 -323
- package/lib/webrtc/groupCall.d.ts.map +0 -1
- package/lib/webrtc/groupCall.js +0 -1337
- package/lib/webrtc/groupCall.js.map +0 -1
- package/lib/webrtc/groupCallEventHandler.d.ts +0 -31
- package/lib/webrtc/groupCallEventHandler.d.ts.map +0 -1
- package/lib/webrtc/groupCallEventHandler.js +0 -178
- package/lib/webrtc/groupCallEventHandler.js.map +0 -1
- package/lib/webrtc/mediaHandler.d.ts +0 -89
- package/lib/webrtc/mediaHandler.d.ts.map +0 -1
- package/lib/webrtc/mediaHandler.js +0 -437
- package/lib/webrtc/mediaHandler.js.map +0 -1
- package/lib/webrtc/stats/callFeedStatsReporter.d.ts +0 -8
- package/lib/webrtc/stats/callFeedStatsReporter.d.ts.map +0 -1
- package/lib/webrtc/stats/callFeedStatsReporter.js +0 -82
- package/lib/webrtc/stats/callFeedStatsReporter.js.map +0 -1
- package/lib/webrtc/stats/callStatsReportGatherer.d.ts +0 -25
- package/lib/webrtc/stats/callStatsReportGatherer.d.ts.map +0 -1
- package/lib/webrtc/stats/callStatsReportGatherer.js +0 -199
- package/lib/webrtc/stats/callStatsReportGatherer.js.map +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.d.ts +0 -17
- package/lib/webrtc/stats/callStatsReportSummary.d.ts.map +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.js +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.js.map +0 -1
- package/lib/webrtc/stats/connectionStats.d.ts +0 -28
- package/lib/webrtc/stats/connectionStats.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStats.js +0 -26
- package/lib/webrtc/stats/connectionStats.js.map +0 -1
- package/lib/webrtc/stats/connectionStatsBuilder.d.ts +0 -5
- package/lib/webrtc/stats/connectionStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStatsBuilder.js +0 -27
- package/lib/webrtc/stats/connectionStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts +0 -7
- package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStatsReportBuilder.js +0 -121
- package/lib/webrtc/stats/connectionStatsReportBuilder.js.map +0 -1
- package/lib/webrtc/stats/groupCallStats.d.ts +0 -22
- package/lib/webrtc/stats/groupCallStats.d.ts.map +0 -1
- package/lib/webrtc/stats/groupCallStats.js +0 -78
- package/lib/webrtc/stats/groupCallStats.js.map +0 -1
- package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts +0 -10
- package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaSsrcHandler.js +0 -57
- package/lib/webrtc/stats/media/mediaSsrcHandler.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackHandler.d.ts +0 -12
- package/lib/webrtc/stats/media/mediaTrackHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackHandler.js +0 -62
- package/lib/webrtc/stats/media/mediaTrackHandler.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStats.d.ts +0 -86
- package/lib/webrtc/stats/media/mediaTrackStats.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStats.js +0 -142
- package/lib/webrtc/stats/media/mediaTrackStats.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts +0 -22
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.js +0 -76
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.js.map +0 -1
- package/lib/webrtc/stats/statsReport.d.ts +0 -99
- package/lib/webrtc/stats/statsReport.d.ts.map +0 -1
- package/lib/webrtc/stats/statsReport.js +0 -32
- package/lib/webrtc/stats/statsReport.js.map +0 -1
- package/lib/webrtc/stats/statsReportEmitter.d.ts +0 -15
- package/lib/webrtc/stats/statsReportEmitter.d.ts.map +0 -1
- package/lib/webrtc/stats/statsReportEmitter.js +0 -33
- package/lib/webrtc/stats/statsReportEmitter.js.map +0 -1
- package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts +0 -16
- package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts.map +0 -1
- package/lib/webrtc/stats/summaryStatsReportGatherer.js +0 -116
- package/lib/webrtc/stats/summaryStatsReportGatherer.js.map +0 -1
- package/lib/webrtc/stats/trackStatsBuilder.d.ts +0 -19
- package/lib/webrtc/stats/trackStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/trackStatsBuilder.js +0 -168
- package/lib/webrtc/stats/trackStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/transportStats.d.ts +0 -11
- package/lib/webrtc/stats/transportStats.d.ts.map +0 -1
- package/lib/webrtc/stats/transportStats.js +0 -1
- package/lib/webrtc/stats/transportStats.js.map +0 -1
- package/lib/webrtc/stats/transportStatsBuilder.d.ts +0 -5
- package/lib/webrtc/stats/transportStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/transportStatsBuilder.js +0 -34
- package/lib/webrtc/stats/transportStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/valueFormatter.d.ts +0 -4
- package/lib/webrtc/stats/valueFormatter.d.ts.map +0 -1
- package/lib/webrtc/stats/valueFormatter.js +0 -25
- package/lib/webrtc/stats/valueFormatter.js.map +0 -1
- package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
- package/src/@types/crypto.ts +0 -73
- package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
- package/src/common-crypto/CryptoBackend.ts +0 -302
- package/src/common-crypto/README.md +0 -4
- package/src/common-crypto/key-passphrase.ts +0 -43
- package/src/crypto/CrossSigning.ts +0 -773
- package/src/crypto/DeviceList.ts +0 -989
- package/src/crypto/EncryptionSetup.ts +0 -351
- package/src/crypto/OlmDevice.ts +0 -1500
- package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
- package/src/crypto/RoomList.ts +0 -70
- package/src/crypto/SecretSharing.ts +0 -240
- package/src/crypto/SecretStorage.ts +0 -136
- package/src/crypto/aes.ts +0 -23
- package/src/crypto/algorithms/base.ts +0 -236
- package/src/crypto/algorithms/index.ts +0 -20
- package/src/crypto/algorithms/megolm.ts +0 -2216
- package/src/crypto/algorithms/olm.ts +0 -381
- package/src/crypto/api.ts +0 -70
- package/src/crypto/backup.ts +0 -922
- package/src/crypto/crypto.ts +0 -18
- package/src/crypto/dehydration.ts +0 -272
- package/src/crypto/device-converter.ts +0 -45
- package/src/crypto/deviceinfo.ts +0 -158
- package/src/crypto/index.ts +0 -4418
- package/src/crypto/key_passphrase.ts +0 -42
- package/src/crypto/keybackup.ts +0 -47
- package/src/crypto/olmlib.ts +0 -539
- package/src/crypto/recoverykey.ts +0 -18
- package/src/crypto/store/base.ts +0 -348
- package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
- package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
- package/src/crypto/store/localStorage-crypto-store.ts +0 -579
- package/src/crypto/store/memory-crypto-store.ts +0 -680
- package/src/crypto/verification/Base.ts +0 -409
- package/src/crypto/verification/Error.ts +0 -76
- package/src/crypto/verification/IllegalMethod.ts +0 -50
- package/src/crypto/verification/QRCode.ts +0 -310
- package/src/crypto/verification/SAS.ts +0 -494
- package/src/crypto/verification/SASDecimal.ts +0 -37
- package/src/crypto/verification/request/Channel.ts +0 -34
- package/src/crypto/verification/request/InRoomChannel.ts +0 -371
- package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
- package/src/crypto/verification/request/VerificationRequest.ts +0 -976
- package/src/crypto-api/CryptoEvent.ts +0 -93
- package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
- package/src/crypto-api/index.ts +0 -1175
- package/src/crypto-api/key-passphrase.ts +0 -58
- package/src/crypto-api/keybackup.ts +0 -115
- package/src/crypto-api/recovery-key.ts +0 -69
- package/src/crypto-api/verification.ts +0 -408
- package/src/matrixrtc/CallMembership.ts +0 -247
- package/src/matrixrtc/LivekitFocus.ts +0 -39
- package/src/matrixrtc/MatrixRTCSession.ts +0 -1319
- package/src/matrixrtc/MatrixRTCSessionManager.ts +0 -166
- package/src/matrixrtc/focus.ts +0 -25
- package/src/matrixrtc/index.ts +0 -22
- package/src/matrixrtc/types.ts +0 -36
- package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
- package/src/rendezvous/RendezvousChannel.ts +0 -48
- package/src/rendezvous/RendezvousCode.ts +0 -25
- package/src/rendezvous/RendezvousError.ts +0 -26
- package/src/rendezvous/RendezvousFailureReason.ts +0 -49
- package/src/rendezvous/RendezvousIntent.ts +0 -20
- package/src/rendezvous/RendezvousTransport.ts +0 -58
- package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
- package/src/rendezvous/channels/index.ts +0 -17
- package/src/rendezvous/index.ts +0 -25
- package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
- package/src/rendezvous/transports/index.ts +0 -17
- package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
- package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
- package/src/rust-crypto/KeyClaimManager.ts +0 -86
- package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
- package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
- package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
- package/src/rust-crypto/RoomEncryptor.ts +0 -352
- package/src/rust-crypto/backup.ts +0 -881
- package/src/rust-crypto/constants.ts +0 -18
- package/src/rust-crypto/device-converter.ts +0 -128
- package/src/rust-crypto/index.ts +0 -237
- package/src/rust-crypto/libolm_migration.ts +0 -530
- package/src/rust-crypto/rust-crypto.ts +0 -2205
- package/src/rust-crypto/secret-storage.ts +0 -60
- package/src/rust-crypto/verification.ts +0 -830
- package/src/secret-storage.ts +0 -693
- package/src/utils/decryptAESSecretStorageItem.ts +0 -54
- package/src/utils/encryptAESSecretStorageItem.ts +0 -73
- package/src/utils/internal/deriveKeys.ts +0 -63
- package/src/webrtc/audioContext.ts +0 -44
- package/src/webrtc/call.ts +0 -3074
- package/src/webrtc/callEventHandler.ts +0 -425
- package/src/webrtc/callEventTypes.ts +0 -93
- package/src/webrtc/callFeed.ts +0 -364
- package/src/webrtc/groupCall.ts +0 -1735
- package/src/webrtc/groupCallEventHandler.ts +0 -234
- package/src/webrtc/mediaHandler.ts +0 -484
- package/src/webrtc/stats/callFeedStatsReporter.ts +0 -94
- package/src/webrtc/stats/callStatsReportGatherer.ts +0 -219
- package/src/webrtc/stats/callStatsReportSummary.ts +0 -30
- package/src/webrtc/stats/connectionStats.ts +0 -47
- package/src/webrtc/stats/connectionStatsBuilder.ts +0 -28
- package/src/webrtc/stats/connectionStatsReportBuilder.ts +0 -140
- package/src/webrtc/stats/groupCallStats.ts +0 -93
- package/src/webrtc/stats/media/mediaSsrcHandler.ts +0 -57
- package/src/webrtc/stats/media/mediaTrackHandler.ts +0 -76
- package/src/webrtc/stats/media/mediaTrackStats.ts +0 -176
- package/src/webrtc/stats/media/mediaTrackStatsHandler.ts +0 -90
- package/src/webrtc/stats/statsReport.ts +0 -133
- package/src/webrtc/stats/statsReportEmitter.ts +0 -49
- package/src/webrtc/stats/summaryStatsReportGatherer.ts +0 -148
- package/src/webrtc/stats/trackStatsBuilder.ts +0 -207
- package/src/webrtc/stats/transportStats.ts +0 -26
- package/src/webrtc/stats/transportStatsBuilder.ts +0 -48
- package/src/webrtc/stats/valueFormatter.ts +0 -27
package/lib/client.d.ts
CHANGED
@@ -2,59 +2,39 @@
|
|
2
2
|
* This is an internal module. See {@link MatrixClient} for the public class.
|
3
3
|
*/
|
4
4
|
import { Optional } from "matrix-events-sdk";
|
5
|
-
import type { IDeviceKeys, IMegolmSessionData, IOneTimeKey } from "./@types/crypto.ts";
|
6
5
|
import { ISyncStateData, SetPresence, SyncApi, SyncApiOptions, SyncState } from "./sync.ts";
|
7
|
-
import { EventStatus,
|
8
|
-
import { CallEvent, CallEventHandlerMap, MatrixCall } from "./webrtc/call.ts";
|
6
|
+
import { EventStatus, IDecryptOptions, IEvent, MatrixEvent, MatrixEventEvent, MatrixEventHandlerMap, PushDetails } from "./models/event.ts";
|
9
7
|
import { Filter, IFilterDefinition } from "./filter.ts";
|
10
|
-
import { CallEventHandler, CallEventHandlerEvent, CallEventHandlerEventHandlerMap } from "./webrtc/callEventHandler.ts";
|
11
|
-
import { GroupCallEventHandler, GroupCallEventHandlerEvent, GroupCallEventHandlerEventHandlerMap } from "./webrtc/groupCallEventHandler.ts";
|
12
8
|
import { QueryDict } from "./utils.ts";
|
13
9
|
import { Direction, EventTimeline } from "./models/event-timeline.ts";
|
14
10
|
import { IActionsObject, PushProcessor } from "./pushprocessor.ts";
|
15
11
|
import { AutoDiscoveryAction } from "./autodiscovery.ts";
|
16
|
-
import { IExportedDevice as IExportedOlmDevice } from "./crypto/OlmDevice.ts";
|
17
|
-
import { IOlmDevice } from "./crypto/algorithms/megolm.ts";
|
18
12
|
import { TypedReEmitter } from "./ReEmitter.ts";
|
19
|
-
import { IRoomEncryption } from "./crypto/RoomList.ts";
|
20
13
|
import { Logger } from "./logger.ts";
|
21
14
|
import { SERVICE_TYPES } from "./service-types.ts";
|
22
15
|
import { FileType, HttpApiEvent, HttpApiEventHandlerMap, IHttpOpts, IRequestOpts, MatrixError, MatrixHttpApi, TokenRefreshFunction, Upload, UploadOpts, UploadResponse } from "./http-api/index.ts";
|
23
|
-
import { Crypto, CryptoEvent as LegacyCryptoEvent, CryptoEventHandlerMap as LegacyCryptoEventHandlerMap, ICheckOwnCrossSigningTrustOpts } from "./crypto/index.ts";
|
24
|
-
import { DeviceInfo } from "./crypto/deviceinfo.ts";
|
25
16
|
import { User, UserEvent, UserEventHandlerMap } from "./models/user.ts";
|
26
|
-
import { IDehydratedDevice, IDehydratedDeviceKeyInfo } from "./crypto/dehydration.ts";
|
27
|
-
import { IKeyBackupInfo, IKeyBackupPrepareOpts, IKeyBackupRestoreOpts, IKeyBackupRestoreResult } from "./crypto/keybackup.ts";
|
28
17
|
import { IIdentityServerProvider } from "./@types/IIdentityServerProvider.ts";
|
29
18
|
import { MatrixScheduler } from "./scheduler.ts";
|
30
19
|
import { BeaconEvent, BeaconEventHandlerMap } from "./models/beacon.ts";
|
31
20
|
import { AuthDict } from "./interactive-auth.ts";
|
32
21
|
import { IMinimalEvent, IRoomEvent, IStateEvent } from "./sync-accumulator.ts";
|
33
|
-
import { CrossSigningKey, ICreateSecretStorageOpts, IEncryptedEventInfo, IRecoveryKey } from "./crypto/api.ts";
|
34
22
|
import { EventTimelineSet } from "./models/event-timeline-set.ts";
|
35
|
-
import { VerificationRequest } from "./crypto/verification/request/VerificationRequest.ts";
|
36
|
-
import { VerificationBase as Verification } from "./crypto/verification/Base.ts";
|
37
|
-
import { CrossSigningInfo, DeviceTrustLevel, ICacheCallbacks, UserTrustLevel } from "./crypto/CrossSigning.ts";
|
38
23
|
import { Room, RoomEvent, RoomEventHandlerMap, RoomNameState } from "./models/room.ts";
|
39
24
|
import { RoomMemberEvent, RoomMemberEventHandlerMap } from "./models/room-member.ts";
|
40
25
|
import { RoomStateEvent, RoomStateEventHandlerMap } from "./models/room-state.ts";
|
41
26
|
import { DelayedEventInfo, IAddThreePidOnlyBody, IBindThreePidBody, ICreateRoomOpts, IEventSearchOpts, IGuestAccessOpts, IJoinRoomOpts, IPaginateOpts, IPresenceOpts, IRedactOpts, IRelationsRequestOpts, IRelationsResponse, IRoomDirectoryOptions, ISearchOpts, ISendEventResponse, IStatusResponse, ITagsResponse, KnockRoomOpts, SendDelayedEventRequestOpts, SendDelayedEventResponse, UpdateDelayedEventAction } from "./@types/requests.ts";
|
42
|
-
import { EventType, RelationType, RoomType, StateEvents, TimelineEvents } from "./@types/event.ts";
|
27
|
+
import { AccountDataEvents, EventType, RelationType, RoomType, StateEvents, TimelineEvents } from "./@types/event.ts";
|
43
28
|
import { IdServerUnbindResult, JoinRule, Preset, Visibility } from "./@types/partials.ts";
|
44
29
|
import { EventMapper, MapperOpts } from "./event-mapper.ts";
|
45
|
-
import { IKeyBackup, IKeyBackupCheck, IPreparedKeyBackupVersion, TrustInfo } from "./crypto/backup.ts";
|
46
30
|
import { MSC3089TreeSpace } from "./models/MSC3089TreeSpace.ts";
|
47
31
|
import { ISignatures } from "./@types/signed.ts";
|
48
32
|
import { IStore } from "./store/index.ts";
|
49
|
-
import { ISecretRequest } from "./crypto/SecretStorage.ts";
|
50
33
|
import { IEventWithRoomId, ISearchRequestBody, ISearchResponse, ISearchResults, IStateEventWithRoomId } from "./@types/search.ts";
|
51
34
|
import { ISynapseAdminDeactivateResponse, ISynapseAdminWhoisResponse } from "./@types/synapse.ts";
|
52
35
|
import { IHierarchyRoom } from "./@types/spaces.ts";
|
53
36
|
import { IPusher, IPusherRequest, IPushRule, IPushRules, PushRuleAction, PushRuleKind, RuleId } from "./@types/PushRules.ts";
|
54
37
|
import { IThreepid } from "./@types/threepids.ts";
|
55
|
-
import { CryptoStore, OutgoingRoomKeyRequest } from "./crypto/store/base.ts";
|
56
|
-
import { GroupCall, GroupCallIntent, GroupCallType, IGroupCallDataChannelOptions } from "./webrtc/groupCall.ts";
|
57
|
-
import { MediaHandler } from "./webrtc/mediaHandler.ts";
|
58
38
|
import { ILoginFlowsResponse, IRefreshTokenResponse, LoginRequest, LoginResponse, LoginTokenPostResponse, SSOAction } from "./@types/auth.ts";
|
59
39
|
import { TypedEventEmitter } from "./models/typed-event-emitter.ts";
|
60
40
|
import { ReceiptType } from "./@types/read_receipts.ts";
|
@@ -68,29 +48,19 @@ import { IgnoredInvites } from "./models/invites-ignorer.ts";
|
|
68
48
|
import { UIAResponse } from "./@types/uia.ts";
|
69
49
|
import { LocalNotificationSettings } from "./@types/local_notifications.ts";
|
70
50
|
import { Feature, ServerSupport } from "./feature.ts";
|
71
|
-
import { BootstrapCrossSigningOpts, CrossSigningKeyInfo, CryptoApi, ImportRoomKeysOpts, CryptoEvent, CryptoEventHandlerMap, CryptoCallbacks } from "./crypto-api/index.ts";
|
72
|
-
import { DeviceInfoMap } from "./crypto/DeviceList.ts";
|
73
|
-
import { AddSecretStorageKeyOpts, SecretStorageKeyDescription, ServerSideSecretStorage } from "./secret-storage.ts";
|
74
51
|
import { RegisterRequest, RegisterResponse } from "./@types/registration.ts";
|
75
|
-
import { MatrixRTCSessionManager } from "./matrixrtc/MatrixRTCSessionManager.ts";
|
76
52
|
import { Membership } from "./@types/membership.ts";
|
77
53
|
import { RoomMessageEventContent } from "./@types/events.ts";
|
78
54
|
import { ImageInfo } from "./@types/media.ts";
|
79
55
|
import { Capabilities } from "./serverCapabilities.ts";
|
56
|
+
import { OidcClientConfig } from "./oidc/index.ts";
|
80
57
|
export type Store = IStore;
|
81
58
|
export type ResetTimelineCallback = (roomId: string) => boolean;
|
82
|
-
export declare const CRYPTO_ENABLED: boolean;
|
83
59
|
export declare const UNSTABLE_MSC3852_LAST_SEEN_UA: UnstableValue<"last_seen_user_agent", "org.matrix.msc3852.last_seen_user_agent">;
|
84
60
|
interface IExportedDevice {
|
85
|
-
olmDevice: IExportedOlmDevice;
|
86
61
|
userId: string;
|
87
62
|
deviceId: string;
|
88
63
|
}
|
89
|
-
export interface IKeysUploadResponse {
|
90
|
-
one_time_key_counts: {
|
91
|
-
[algorithm: string]: number;
|
92
|
-
};
|
93
|
-
}
|
94
64
|
export interface ICreateClientOpts {
|
95
65
|
baseUrl: string;
|
96
66
|
idBaseUrl?: string;
|
@@ -100,19 +70,6 @@ export interface ICreateClientOpts {
|
|
100
70
|
* will create a default store if needed.
|
101
71
|
*/
|
102
72
|
store?: Store;
|
103
|
-
/**
|
104
|
-
* A store to be used for end-to-end crypto session data.
|
105
|
-
* The `createClient` helper will create a default store if needed. Calls the factory supplied to
|
106
|
-
* {@link setCryptoStoreFactory} if unspecified; or if no factory has been
|
107
|
-
* specified, uses a default implementation (indexeddb in the browser,
|
108
|
-
* in-memory otherwise).
|
109
|
-
*
|
110
|
-
* This is only used for the legacy crypto implementation (as used by {@link MatrixClient#initCrypto}),
|
111
|
-
* but if you use the rust crypto implementation ({@link MatrixClient#initRustCrypto}) and the device
|
112
|
-
* previously used legacy crypto (so must be migrated), then this must still be provided, so that the
|
113
|
-
* data can be migrated from the legacy store.
|
114
|
-
*/
|
115
|
-
cryptoStore?: CryptoStore;
|
116
73
|
/**
|
117
74
|
* The scheduler to use. If not
|
118
75
|
* specified, this client will not retry requests on failure. This client
|
@@ -184,17 +141,6 @@ export interface ICreateClientOpts {
|
|
184
141
|
* level (they are present in the exported data).
|
185
142
|
*/
|
186
143
|
deviceToImport?: IExportedDevice;
|
187
|
-
/**
|
188
|
-
* Encryption key used for encrypting sensitive data (such as e2ee keys) in {@link ICreateClientOpts#cryptoStore}.
|
189
|
-
*
|
190
|
-
* This must be set to the same value every time the client is initialised for the same device.
|
191
|
-
*
|
192
|
-
* This is only used for the legacy crypto implementation (as used by {@link MatrixClient#initCrypto}),
|
193
|
-
* but if you use the rust crypto implementation ({@link MatrixClient#initRustCrypto}) and the device
|
194
|
-
* previously used legacy crypto (so must be migrated), then this must still be provided, so that the
|
195
|
-
* data can be migrated from the legacy store.
|
196
|
-
*/
|
197
|
-
pickleKey?: string;
|
198
144
|
/**
|
199
145
|
* Verification methods we should offer to the other side when performing an interactive verification.
|
200
146
|
* If unset, we will offer all known methods. Currently these are: showing a QR code, scanning a QR code, and SAS
|
@@ -203,35 +149,18 @@ export interface ICreateClientOpts {
|
|
203
149
|
* See {@link types.VerificationMethod} for a set of useful constants for this parameter.
|
204
150
|
*/
|
205
151
|
verificationMethods?: Array<string>;
|
206
|
-
/**
|
207
|
-
* Whether relaying calls through a TURN server should be forced. Default false.
|
208
|
-
*/
|
209
|
-
forceTURN?: boolean;
|
210
152
|
/**
|
211
153
|
* Up to this many ICE candidates will be gathered when an incoming call arrives.
|
212
154
|
* Gathering does not send data to the caller, but will communicate with the configured TURN
|
213
155
|
* server. Default 0.
|
214
156
|
*/
|
215
157
|
iceCandidatePoolSize?: number;
|
216
|
-
/**
|
217
|
-
* True to advertise support for call transfers to other parties on Matrix calls. Default false.
|
218
|
-
*/
|
219
|
-
supportsCallTransfer?: boolean;
|
220
158
|
/**
|
221
159
|
* Whether to allow a fallback ICE server should be used for negotiating a
|
222
160
|
* WebRTC connection if the homeserver doesn't provide any servers. Defaults to false.
|
223
161
|
*/
|
224
162
|
fallbackICEServerAllowed?: boolean;
|
225
|
-
/**
|
226
|
-
* If true, to-device signalling for group calls will be encrypted
|
227
|
-
* with Olm. Default: true.
|
228
|
-
*/
|
229
|
-
useE2eForGroupCall?: boolean;
|
230
163
|
livekitServiceURL?: string;
|
231
|
-
/**
|
232
|
-
* Crypto callbacks provided by the application
|
233
|
-
*/
|
234
|
-
cryptoCallbacks?: CryptoCallbacks;
|
235
164
|
/**
|
236
165
|
* Method to generate room names for empty rooms and rooms names based on membership.
|
237
166
|
* Defaults to a built-in English handler with basic pluralisation.
|
@@ -326,21 +255,7 @@ export declare const UNSTABLE_MSC2666_MUTUAL_ROOMS = "uk.half-shot.msc2666.mutua
|
|
326
255
|
export declare const UNSTABLE_MSC2666_QUERY_MUTUAL_ROOMS = "uk.half-shot.msc2666.query_mutual_rooms";
|
327
256
|
export declare const UNSTABLE_MSC4140_DELAYED_EVENTS = "org.matrix.msc4140";
|
328
257
|
export declare const UNSTABLE_MSC4133_EXTENDED_PROFILES = "uk.tcpip.msc4133";
|
329
|
-
declare enum CrossSigningKeyType {
|
330
|
-
MasterKey = "master_key",
|
331
|
-
SelfSigningKey = "self_signing_key",
|
332
|
-
UserSigningKey = "user_signing_key"
|
333
|
-
}
|
334
|
-
export type CrossSigningKeys = Record<CrossSigningKeyType, CrossSigningKeyInfo>;
|
335
258
|
export type SendToDeviceContentMap = Map<string, Map<string, Record<string, any>>>;
|
336
|
-
export interface ISignedKey {
|
337
|
-
keys: Record<string, string>;
|
338
|
-
signatures: ISignatures;
|
339
|
-
user_id: string;
|
340
|
-
algorithms: string[];
|
341
|
-
device_id: string;
|
342
|
-
}
|
343
|
-
export type KeySignatures = Record<string, Record<string, CrossSigningKeyInfo | ISignedKey>>;
|
344
259
|
export interface IUploadKeySignaturesResponse {
|
345
260
|
failures: Record<string, Record<string, {
|
346
261
|
errcode: string;
|
@@ -410,11 +325,6 @@ export interface IRequestMsisdnTokenResponse extends IRequestTokenResponse {
|
|
410
325
|
success: boolean;
|
411
326
|
intl_fmt: string;
|
412
327
|
}
|
413
|
-
export interface IUploadKeysRequest {
|
414
|
-
"device_keys"?: Required<IDeviceKeys>;
|
415
|
-
"one_time_keys"?: Record<string, IOneTimeKey>;
|
416
|
-
"org.matrix.msc2732.fallback_keys"?: Record<string, IOneTimeKey>;
|
417
|
-
}
|
418
328
|
export interface IQueryKeysRequest {
|
419
329
|
device_keys: {
|
420
330
|
[userId: string]: string[];
|
@@ -503,33 +413,6 @@ export interface Keys {
|
|
503
413
|
usage: string[];
|
504
414
|
user_id: string;
|
505
415
|
}
|
506
|
-
export interface SigningKeys extends Keys {
|
507
|
-
signatures: ISignatures;
|
508
|
-
}
|
509
|
-
export interface DeviceKeys {
|
510
|
-
[deviceId: string]: IDeviceKeys & {
|
511
|
-
unsigned?: {
|
512
|
-
device_display_name: string;
|
513
|
-
};
|
514
|
-
};
|
515
|
-
}
|
516
|
-
export interface IDownloadKeyResult {
|
517
|
-
failures: {
|
518
|
-
[serverName: string]: object;
|
519
|
-
};
|
520
|
-
device_keys: {
|
521
|
-
[userId: string]: DeviceKeys;
|
522
|
-
};
|
523
|
-
master_keys?: {
|
524
|
-
[userId: string]: Keys;
|
525
|
-
};
|
526
|
-
self_signing_keys?: {
|
527
|
-
[userId: string]: SigningKeys;
|
528
|
-
};
|
529
|
-
user_signing_keys?: {
|
530
|
-
[userId: string]: SigningKeys;
|
531
|
-
};
|
532
|
-
}
|
533
416
|
export interface IClaimOTKsResult {
|
534
417
|
failures: {
|
535
418
|
[serverName: string]: object;
|
@@ -621,12 +504,10 @@ export declare enum ClientEvent {
|
|
621
504
|
}
|
622
505
|
type RoomEvents = RoomEvent.Name | RoomEvent.Redaction | RoomEvent.RedactionCancelled | RoomEvent.Receipt | RoomEvent.Tags | RoomEvent.LocalEchoUpdated | RoomEvent.HistoryImportedWithinTimeline | RoomEvent.AccountData | RoomEvent.MyMembership | RoomEvent.Timeline | RoomEvent.TimelineReset;
|
623
506
|
type RoomStateEvents = RoomStateEvent.Events | RoomStateEvent.Members | RoomStateEvent.NewMember | RoomStateEvent.Update | RoomStateEvent.Marker;
|
624
|
-
type LegacyCryptoEvents = LegacyCryptoEvent.KeySignatureUploadFailure | LegacyCryptoEvent.KeyBackupStatus | LegacyCryptoEvent.KeyBackupFailed | LegacyCryptoEvent.KeyBackupSessionsRemaining | LegacyCryptoEvent.KeyBackupDecryptionKeyCached | LegacyCryptoEvent.RoomKeyRequest | LegacyCryptoEvent.RoomKeyRequestCancellation | LegacyCryptoEvent.VerificationRequest | LegacyCryptoEvent.VerificationRequestReceived | LegacyCryptoEvent.DeviceVerificationChanged | LegacyCryptoEvent.UserTrustStatusChanged | LegacyCryptoEvent.KeysChanged | LegacyCryptoEvent.Warning | LegacyCryptoEvent.DevicesUpdated | LegacyCryptoEvent.WillUpdateDevices | LegacyCryptoEvent.LegacyCryptoStoreMigrationProgress;
|
625
|
-
type CryptoEvents = (typeof CryptoEvent)[keyof typeof CryptoEvent];
|
626
507
|
type MatrixEventEvents = MatrixEventEvent.Decrypted | MatrixEventEvent.Replaced | MatrixEventEvent.VisibilityChange;
|
627
508
|
type RoomMemberEvents = RoomMemberEvent.Name | RoomMemberEvent.Typing | RoomMemberEvent.PowerLevel | RoomMemberEvent.Membership;
|
628
509
|
type UserEvents = UserEvent.AvatarUrl | UserEvent.DisplayName | UserEvent.Presence | UserEvent.CurrentlyActive | UserEvent.LastPresenceTs;
|
629
|
-
export type EmittedEvents = ClientEvent | RoomEvents | RoomStateEvents |
|
510
|
+
export type EmittedEvents = ClientEvent | RoomEvents | RoomStateEvents | MatrixEventEvents | RoomMemberEvents | UserEvents | HttpApiEvent.SessionLoggedOut | HttpApiEvent.NoConsent | BeaconEvent;
|
630
511
|
export type ClientEventHandlerMap = {
|
631
512
|
/**
|
632
513
|
* Fires whenever the SDK's syncing state is updated. The state can be one of:
|
@@ -822,7 +703,7 @@ export type ClientEventHandlerMap = {
|
|
822
703
|
[ClientEvent.ReceivedVoipEvent]: (event: MatrixEvent) => void;
|
823
704
|
[ClientEvent.TurnServers]: (servers: ITurnServer[]) => void;
|
824
705
|
[ClientEvent.TurnServersError]: (error: Error, fatal: boolean) => void;
|
825
|
-
} & RoomEventHandlerMap & RoomStateEventHandlerMap &
|
706
|
+
} & RoomEventHandlerMap & RoomStateEventHandlerMap & MatrixEventHandlerMap & RoomMemberEventHandlerMap & UserEventHandlerMap & HttpApiEventHandlerMap & BeaconEventHandlerMap;
|
826
707
|
/**
|
827
708
|
* Represents a Matrix Client. Only directly construct this if you want to use
|
828
709
|
* custom modules. Normally, {@link createClient} should be used
|
@@ -839,16 +720,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
839
720
|
credentials: {
|
840
721
|
userId: string | null;
|
841
722
|
};
|
842
|
-
/**
|
843
|
-
* Encryption key used for encrypting sensitive data (such as e2ee keys) in storage.
|
844
|
-
*
|
845
|
-
* As supplied in the constructor via {@link IMatrixClientCreateOpts#pickleKey}.
|
846
|
-
*
|
847
|
-
* If unset, either a hardcoded key or no encryption at all is used, depending on the Crypto implementation.
|
848
|
-
*
|
849
|
-
* @deprecated this should be a private property.
|
850
|
-
*/
|
851
|
-
pickleKey?: string;
|
852
723
|
scheduler?: MatrixScheduler;
|
853
724
|
clientRunning: boolean;
|
854
725
|
timelineSupport: boolean;
|
@@ -859,25 +730,11 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
859
730
|
http: MatrixHttpApi<IHttpOpts & {
|
860
731
|
onlyData: true;
|
861
732
|
}>;
|
862
|
-
/**
|
863
|
-
* The libolm crypto implementation, if it is in use.
|
864
|
-
*
|
865
|
-
* @deprecated This should not be used. Instead, use the methods exposed directly on this class or
|
866
|
-
* (where they are available) via {@link getCrypto}.
|
867
|
-
*/
|
868
|
-
crypto?: Crypto;
|
869
|
-
private cryptoBackend?;
|
870
|
-
cryptoCallbacks: CryptoCallbacks;
|
871
|
-
callEventHandler?: CallEventHandler;
|
872
|
-
groupCallEventHandler?: GroupCallEventHandler;
|
873
|
-
supportsCallTransfer: boolean;
|
874
|
-
forceTURN: boolean;
|
875
733
|
iceCandidatePoolSize: number;
|
876
734
|
idBaseUrl?: string;
|
877
735
|
baseUrl: string;
|
878
736
|
readonly isVoipWithNoMediaAllowed: boolean;
|
879
737
|
useLivekitForGroupCalls: boolean;
|
880
|
-
protected canSupportVoip: boolean;
|
881
738
|
protected peekSync: SyncApi | null;
|
882
739
|
protected isGuestAccount: boolean;
|
883
740
|
protected ongoingScrollbacks: {
|
@@ -887,7 +744,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
887
744
|
};
|
888
745
|
};
|
889
746
|
protected notifTimelineSet: EventTimelineSet | null;
|
890
|
-
protected cryptoStore?: CryptoStore;
|
891
747
|
protected verificationMethods?: string[];
|
892
748
|
protected fallbackICEServerAllowed: boolean;
|
893
749
|
protected syncApi?: SlidingSyncSdk | SyncApi;
|
@@ -903,12 +759,7 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
903
759
|
protected serverVersionsPromise?: Promise<IServerVersions>;
|
904
760
|
protected clientWellKnown?: IClientWellKnown;
|
905
761
|
protected clientWellKnownPromise?: Promise<IClientWellKnown>;
|
906
|
-
protected turnServers: ITurnServer[];
|
907
|
-
protected turnServersExpiry: number;
|
908
|
-
protected checkTurnServersIntervalID?: ReturnType<typeof setInterval>;
|
909
|
-
protected exportedOlmDeviceToImport?: IExportedOlmDevice;
|
910
762
|
protected txnCtr: number;
|
911
|
-
protected mediaHandler: MediaHandler;
|
912
763
|
protected sessionId: string;
|
913
764
|
/** IDs of events which are currently being encrypted.
|
914
765
|
*
|
@@ -916,12 +767,9 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
916
767
|
* that tells us that it has been cancelled, and we should not send it.
|
917
768
|
*/
|
918
769
|
private eventsBeingEncrypted;
|
919
|
-
private useE2eForGroupCall;
|
920
770
|
private toDeviceMessageQueue;
|
921
771
|
livekitServiceURL?: string;
|
922
|
-
private _secretStorage;
|
923
772
|
readonly ignoredInvites: IgnoredInvites;
|
924
|
-
readonly matrixRTC: MatrixRTCSessionManager;
|
925
773
|
private serverCapabilitiesService;
|
926
774
|
constructor(opts: IMatrixClientCreateOpts);
|
927
775
|
set store(newStore: Store);
|
@@ -943,53 +791,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
943
791
|
* clean shutdown.
|
944
792
|
*/
|
945
793
|
stopClient(): void;
|
946
|
-
/**
|
947
|
-
* Try to rehydrate a device if available. The client must have been
|
948
|
-
* initialized with a `cryptoCallback.getDehydrationKey` option, and this
|
949
|
-
* function must be called before initCrypto and startClient are called.
|
950
|
-
*
|
951
|
-
* @returns Promise which resolves to undefined if a device could not be dehydrated, or
|
952
|
-
* to the new device ID if the dehydration was successful.
|
953
|
-
* @returns Rejects: with an error response.
|
954
|
-
*
|
955
|
-
* @deprecated MSC2697 device dehydration is not supported for rust cryptography.
|
956
|
-
*/
|
957
|
-
rehydrateDevice(): Promise<string | undefined>;
|
958
|
-
/**
|
959
|
-
* Get the current dehydrated device, if any
|
960
|
-
* @returns A promise of an object containing the dehydrated device
|
961
|
-
*
|
962
|
-
* @deprecated MSC2697 device dehydration is not supported for rust cryptography.
|
963
|
-
*/
|
964
|
-
getDehydratedDevice(): Promise<IDehydratedDevice | undefined>;
|
965
|
-
/**
|
966
|
-
* Set the dehydration key. This will also periodically dehydrate devices to
|
967
|
-
* the server.
|
968
|
-
*
|
969
|
-
* @param key - the dehydration key
|
970
|
-
* @param keyInfo - Information about the key. Primarily for
|
971
|
-
* information about how to generate the key from a passphrase.
|
972
|
-
* @param deviceDisplayName - The device display name for the
|
973
|
-
* dehydrated device.
|
974
|
-
* @returns A promise that resolves when the dehydrated device is stored.
|
975
|
-
*
|
976
|
-
* @deprecated Not supported for Rust Cryptography.
|
977
|
-
*/
|
978
|
-
setDehydrationKey(key: Uint8Array, keyInfo: IDehydratedDeviceKeyInfo, deviceDisplayName?: string): Promise<void>;
|
979
|
-
/**
|
980
|
-
* Creates a new MSC2967 dehydrated device (without queuing periodic dehydration)
|
981
|
-
* @param key - the dehydration key
|
982
|
-
* @param keyInfo - Information about the key. Primarily for
|
983
|
-
* information about how to generate the key from a passphrase.
|
984
|
-
* @param deviceDisplayName - The device display name for the
|
985
|
-
* dehydrated device.
|
986
|
-
* @returns the device id of the newly created dehydrated device
|
987
|
-
*
|
988
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.startDehydration}.
|
989
|
-
*/
|
990
|
-
createDehydratedDevice(key: Uint8Array, keyInfo: IDehydratedDeviceKeyInfo, deviceDisplayName?: string): Promise<string | undefined>;
|
991
|
-
/** @deprecated Not supported for Rust Cryptography. */
|
992
|
-
exportDevice(): Promise<IExportedDevice | undefined>;
|
993
794
|
/**
|
994
795
|
* Clear any data out of the persistent stores used by the client.
|
995
796
|
*
|
@@ -1029,67 +830,8 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
1029
830
|
* @returns session ID
|
1030
831
|
*/
|
1031
832
|
getSessionId(): string;
|
1032
|
-
/**
|
1033
|
-
* Check if the runtime environment supports VoIP calling.
|
1034
|
-
* @returns True if VoIP is supported.
|
1035
|
-
*/
|
1036
|
-
supportsVoip(): boolean;
|
1037
|
-
/**
|
1038
|
-
* @returns
|
1039
|
-
*/
|
1040
|
-
getMediaHandler(): MediaHandler;
|
1041
|
-
/**
|
1042
|
-
* Set whether VoIP calls are forced to use only TURN
|
1043
|
-
* candidates. This is the same as the forceTURN option
|
1044
|
-
* when creating the client.
|
1045
|
-
* @param force - True to force use of TURN servers
|
1046
|
-
*/
|
1047
|
-
setForceTURN(force: boolean): void;
|
1048
|
-
/**
|
1049
|
-
* Set whether to advertise transfer support to other parties on Matrix calls.
|
1050
|
-
* @param support - True to advertise the 'm.call.transferee' capability
|
1051
|
-
*/
|
1052
|
-
setSupportsCallTransfer(support: boolean): void;
|
1053
|
-
/**
|
1054
|
-
* Returns true if to-device signalling for group calls will be encrypted with Olm.
|
1055
|
-
* If false, it will be sent unencrypted.
|
1056
|
-
* @returns boolean Whether group call signalling will be encrypted
|
1057
|
-
*/
|
1058
|
-
getUseE2eForGroupCall(): boolean;
|
1059
|
-
/**
|
1060
|
-
* Creates a new call.
|
1061
|
-
* The place*Call methods on the returned call can be used to actually place a call
|
1062
|
-
*
|
1063
|
-
* @param roomId - The room the call is to be placed in.
|
1064
|
-
* @returns the call or null if the browser doesn't support calling.
|
1065
|
-
*/
|
1066
|
-
createCall(roomId: string): MatrixCall | null;
|
1067
|
-
/**
|
1068
|
-
* Creates a new group call and sends the associated state event
|
1069
|
-
* to alert other members that the room now has a group call.
|
1070
|
-
*
|
1071
|
-
* @param roomId - The room the call is to be placed in.
|
1072
|
-
*/
|
1073
|
-
createGroupCall(roomId: string, type: GroupCallType, isPtt: boolean, intent: GroupCallIntent, dataChannelsEnabled?: boolean, dataChannelOptions?: IGroupCallDataChannelOptions): Promise<GroupCall>;
|
1074
833
|
getLivekitServiceURL(): string | undefined;
|
1075
834
|
setLivekitServiceURL(newURL: string): void;
|
1076
|
-
/**
|
1077
|
-
* Wait until an initial state for the given room has been processed by the
|
1078
|
-
* client and the client is aware of any ongoing group calls. Awaiting on
|
1079
|
-
* the promise returned by this method before calling getGroupCallForRoom()
|
1080
|
-
* avoids races where getGroupCallForRoom is called before the state for that
|
1081
|
-
* room has been processed. It does not, however, fix other races, eg. two
|
1082
|
-
* clients both creating a group call at the same time.
|
1083
|
-
* @param roomId - The room ID to wait for
|
1084
|
-
* @returns A promise that resolves once existing group calls in the room
|
1085
|
-
* have been processed.
|
1086
|
-
*/
|
1087
|
-
waitUntilRoomReadyForGroupCalls(roomId: string): Promise<void>;
|
1088
|
-
/**
|
1089
|
-
* Get an existing group call for the provided room.
|
1090
|
-
* @returns The group call or null if it doesn't already exist.
|
1091
|
-
*/
|
1092
|
-
getGroupCallForRoom(roomId: string): GroupCall | null;
|
1093
835
|
/**
|
1094
836
|
* Get the current sync state.
|
1095
837
|
* @returns the sync state, which may be null.
|
@@ -1168,965 +910,10 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
1168
910
|
* @returns A promise which resolves to the capabilities of the homeserver
|
1169
911
|
*/
|
1170
912
|
fetchCapabilities(): Promise<Capabilities>;
|
1171
|
-
/**
|
1172
|
-
* Initialise support for end-to-end encryption in this client, using libolm.
|
1173
|
-
*
|
1174
|
-
* You should call this method after creating the matrixclient, but *before*
|
1175
|
-
* calling `startClient`, if you want to support end-to-end encryption.
|
1176
|
-
*
|
1177
|
-
* It will return a Promise which will resolve when the crypto layer has been
|
1178
|
-
* successfully initialised.
|
1179
|
-
*
|
1180
|
-
* @deprecated libolm is deprecated. Prefer {@link initRustCrypto}.
|
1181
|
-
*/
|
1182
|
-
initCrypto(): Promise<void>;
|
1183
|
-
/**
|
1184
|
-
* Initialise support for end-to-end encryption in this client, using the rust matrix-sdk-crypto.
|
1185
|
-
*
|
1186
|
-
* An alternative to {@link initCrypto}.
|
1187
|
-
*
|
1188
|
-
* @param args.useIndexedDB - True to use an indexeddb store, false to use an in-memory store. Defaults to 'true'.
|
1189
|
-
* @param args.storageKey - A key with which to encrypt the indexeddb store. If provided, it must be exactly
|
1190
|
-
* 32 bytes of data, and must be the same each time the client is initialised for a given device.
|
1191
|
-
* If both this and `storagePassword` are unspecified, the store will be unencrypted.
|
1192
|
-
* @param args.storagePassword - An alternative to `storageKey`. A password which will be used to derive a key to
|
1193
|
-
* encrypt the store with. Deriving a key from a password is (deliberately) a slow operation, so prefer
|
1194
|
-
* to pass a `storageKey` directly where possible.
|
1195
|
-
*
|
1196
|
-
* @returns a Promise which will resolve when the crypto layer has been
|
1197
|
-
* successfully initialised.
|
1198
|
-
*/
|
1199
|
-
initRustCrypto(args?: {
|
1200
|
-
useIndexedDB?: boolean;
|
1201
|
-
storageKey?: Uint8Array;
|
1202
|
-
storagePassword?: string;
|
1203
|
-
}): Promise<void>;
|
1204
|
-
/**
|
1205
|
-
* Access the server-side secret storage API for this client.
|
1206
|
-
*/
|
1207
|
-
get secretStorage(): ServerSideSecretStorage;
|
1208
|
-
/**
|
1209
|
-
* Access the crypto API for this client.
|
1210
|
-
*
|
1211
|
-
* If end-to-end encryption has been enabled for this client (via {@link initCrypto} or {@link initRustCrypto}),
|
1212
|
-
* returns an object giving access to the crypto API. Otherwise, returns `undefined`.
|
1213
|
-
*/
|
1214
|
-
getCrypto(): CryptoApi | undefined;
|
1215
|
-
/**
|
1216
|
-
* Is end-to-end crypto enabled for this client.
|
1217
|
-
* @returns True if end-to-end is enabled.
|
1218
|
-
* @deprecated prefer {@link getCrypto}
|
1219
|
-
*/
|
1220
|
-
isCryptoEnabled(): boolean;
|
1221
|
-
/**
|
1222
|
-
* Get the Ed25519 key for this device
|
1223
|
-
*
|
1224
|
-
* @returns base64-encoded ed25519 key. Null if crypto is
|
1225
|
-
* disabled.
|
1226
|
-
*
|
1227
|
-
* @deprecated Not supported for Rust Cryptography.Prefer {@link CryptoApi.getOwnDeviceKeys}
|
1228
|
-
*/
|
1229
|
-
getDeviceEd25519Key(): string | null;
|
1230
|
-
/**
|
1231
|
-
* Get the Curve25519 key for this device
|
1232
|
-
*
|
1233
|
-
* @returns base64-encoded curve25519 key. Null if crypto is
|
1234
|
-
* disabled.
|
1235
|
-
*
|
1236
|
-
* @deprecated Not supported for Rust Cryptography. Use {@link CryptoApi.getOwnDeviceKeys}
|
1237
|
-
*/
|
1238
|
-
getDeviceCurve25519Key(): string | null;
|
1239
913
|
/**
|
1240
914
|
* @deprecated Does nothing.
|
1241
915
|
*/
|
1242
916
|
uploadKeys(): Promise<void>;
|
1243
|
-
/**
|
1244
|
-
* Download the keys for a list of users and stores the keys in the session
|
1245
|
-
* store.
|
1246
|
-
* @param userIds - The users to fetch.
|
1247
|
-
* @param forceDownload - Always download the keys even if cached.
|
1248
|
-
*
|
1249
|
-
* @returns A promise which resolves to a map userId-\>deviceId-\>`DeviceInfo`
|
1250
|
-
*
|
1251
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
|
1252
|
-
*/
|
1253
|
-
downloadKeys(userIds: string[], forceDownload?: boolean): Promise<DeviceInfoMap>;
|
1254
|
-
/**
|
1255
|
-
* Get the stored device keys for a user id
|
1256
|
-
*
|
1257
|
-
* @param userId - the user to list keys for.
|
1258
|
-
*
|
1259
|
-
* @returns list of devices
|
1260
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
|
1261
|
-
*/
|
1262
|
-
getStoredDevicesForUser(userId: string): DeviceInfo[];
|
1263
|
-
/**
|
1264
|
-
* Get the stored device key for a user id and device id
|
1265
|
-
*
|
1266
|
-
* @param userId - the user to list keys for.
|
1267
|
-
* @param deviceId - unique identifier for the device
|
1268
|
-
*
|
1269
|
-
* @returns device or null
|
1270
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
|
1271
|
-
*/
|
1272
|
-
getStoredDevice(userId: string, deviceId: string): DeviceInfo | null;
|
1273
|
-
/**
|
1274
|
-
* Mark the given device as verified
|
1275
|
-
*
|
1276
|
-
* @param userId - owner of the device
|
1277
|
-
* @param deviceId - unique identifier for the device or user's
|
1278
|
-
* cross-signing public key ID.
|
1279
|
-
*
|
1280
|
-
* @param verified - whether to mark the device as verified. defaults
|
1281
|
-
* to 'true'.
|
1282
|
-
*
|
1283
|
-
* @returns
|
1284
|
-
*
|
1285
|
-
* @remarks
|
1286
|
-
* Fires {@link CryptoEvent#DeviceVerificationChanged}
|
1287
|
-
*/
|
1288
|
-
setDeviceVerified(userId: string, deviceId: string, verified?: boolean): Promise<void>;
|
1289
|
-
/**
|
1290
|
-
* Mark the given device as blocked/unblocked
|
1291
|
-
*
|
1292
|
-
* @param userId - owner of the device
|
1293
|
-
* @param deviceId - unique identifier for the device or user's
|
1294
|
-
* cross-signing public key ID.
|
1295
|
-
*
|
1296
|
-
* @param blocked - whether to mark the device as blocked. defaults
|
1297
|
-
* to 'true'.
|
1298
|
-
*
|
1299
|
-
* @returns
|
1300
|
-
*
|
1301
|
-
* @remarks
|
1302
|
-
* Fires {@link LegacyCryptoEvent.DeviceVerificationChanged}
|
1303
|
-
*
|
1304
|
-
* @deprecated Not supported for Rust Cryptography.
|
1305
|
-
*/
|
1306
|
-
setDeviceBlocked(userId: string, deviceId: string, blocked?: boolean): Promise<void>;
|
1307
|
-
/**
|
1308
|
-
* Mark the given device as known/unknown
|
1309
|
-
*
|
1310
|
-
* @param userId - owner of the device
|
1311
|
-
* @param deviceId - unique identifier for the device or user's
|
1312
|
-
* cross-signing public key ID.
|
1313
|
-
*
|
1314
|
-
* @param known - whether to mark the device as known. defaults
|
1315
|
-
* to 'true'.
|
1316
|
-
*
|
1317
|
-
* @returns
|
1318
|
-
*
|
1319
|
-
* @remarks
|
1320
|
-
* Fires {@link CryptoEvent#DeviceVerificationChanged}
|
1321
|
-
*
|
1322
|
-
* @deprecated Not supported for Rust Cryptography.
|
1323
|
-
*/
|
1324
|
-
setDeviceKnown(userId: string, deviceId: string, known?: boolean): Promise<void>;
|
1325
|
-
private setDeviceVerification;
|
1326
|
-
/**
|
1327
|
-
* Request a key verification from another user, using a DM.
|
1328
|
-
*
|
1329
|
-
* @param userId - the user to request verification with
|
1330
|
-
* @param roomId - the room to use for verification
|
1331
|
-
*
|
1332
|
-
* @returns resolves to a VerificationRequest
|
1333
|
-
* when the request has been sent to the other party.
|
1334
|
-
*
|
1335
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.requestVerificationDM}.
|
1336
|
-
*/
|
1337
|
-
requestVerificationDM(userId: string, roomId: string): Promise<VerificationRequest>;
|
1338
|
-
/**
|
1339
|
-
* Finds a DM verification request that is already in progress for the given room id
|
1340
|
-
*
|
1341
|
-
* @param roomId - the room to use for verification
|
1342
|
-
*
|
1343
|
-
* @returns the VerificationRequest that is in progress, if any
|
1344
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.findVerificationRequestDMInProgress}.
|
1345
|
-
*/
|
1346
|
-
findVerificationRequestDMInProgress(roomId: string): VerificationRequest | undefined;
|
1347
|
-
/**
|
1348
|
-
* Returns all to-device verification requests that are already in progress for the given user id
|
1349
|
-
*
|
1350
|
-
* @param userId - the ID of the user to query
|
1351
|
-
*
|
1352
|
-
* @returns the VerificationRequests that are in progress
|
1353
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getVerificationRequestsToDeviceInProgress}.
|
1354
|
-
*/
|
1355
|
-
getVerificationRequestsToDeviceInProgress(userId: string): VerificationRequest[];
|
1356
|
-
/**
|
1357
|
-
* Request a key verification from another user.
|
1358
|
-
*
|
1359
|
-
* @param userId - the user to request verification with
|
1360
|
-
* @param devices - array of device IDs to send requests to. Defaults to
|
1361
|
-
* all devices owned by the user
|
1362
|
-
*
|
1363
|
-
* @returns resolves to a VerificationRequest
|
1364
|
-
* when the request has been sent to the other party.
|
1365
|
-
*
|
1366
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#requestOwnUserVerification} or {@link CryptoApi#requestDeviceVerification}.
|
1367
|
-
*/
|
1368
|
-
requestVerification(userId: string, devices?: string[]): Promise<VerificationRequest>;
|
1369
|
-
/**
|
1370
|
-
* Begin a key verification.
|
1371
|
-
*
|
1372
|
-
* @param method - the verification method to use
|
1373
|
-
* @param userId - the user to verify keys with
|
1374
|
-
* @param deviceId - the device to verify
|
1375
|
-
*
|
1376
|
-
* @returns a verification object
|
1377
|
-
* @deprecated Prefer {@link CryptoApi#requestOwnUserVerification} or {@link CryptoApi#requestDeviceVerification}.
|
1378
|
-
*/
|
1379
|
-
beginKeyVerification(method: string, userId: string, deviceId: string): Verification<any, any>;
|
1380
|
-
/**
|
1381
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#checkKey}.
|
1382
|
-
*/
|
1383
|
-
checkSecretStorageKey(key: Uint8Array, info: SecretStorageKeyDescription): Promise<boolean>;
|
1384
|
-
/**
|
1385
|
-
* Set the global override for whether the client should ever send encrypted
|
1386
|
-
* messages to unverified devices. This provides the default for rooms which
|
1387
|
-
* do not specify a value.
|
1388
|
-
*
|
1389
|
-
* @param value - whether to blacklist all unverified devices by default
|
1390
|
-
*
|
1391
|
-
* @deprecated Prefer direct access to {@link CryptoApi.globalBlacklistUnverifiedDevices}:
|
1392
|
-
*
|
1393
|
-
* ```javascript
|
1394
|
-
* client.getCrypto().globalBlacklistUnverifiedDevices = value;
|
1395
|
-
* ```
|
1396
|
-
*/
|
1397
|
-
setGlobalBlacklistUnverifiedDevices(value: boolean): boolean;
|
1398
|
-
/**
|
1399
|
-
* @returns whether to blacklist all unverified devices by default
|
1400
|
-
*
|
1401
|
-
* @deprecated Prefer direct access to {@link CryptoApi.globalBlacklistUnverifiedDevices}:
|
1402
|
-
*
|
1403
|
-
* ```javascript
|
1404
|
-
* value = client.getCrypto().globalBlacklistUnverifiedDevices;
|
1405
|
-
* ```
|
1406
|
-
*/
|
1407
|
-
getGlobalBlacklistUnverifiedDevices(): boolean;
|
1408
|
-
/**
|
1409
|
-
* Set whether sendMessage in a room with unknown and unverified devices
|
1410
|
-
* should throw an error and not send them message. This has 'Global' for
|
1411
|
-
* symmetry with setGlobalBlacklistUnverifiedDevices but there is currently
|
1412
|
-
* no room-level equivalent for this setting.
|
1413
|
-
*
|
1414
|
-
* This API is currently UNSTABLE and may change or be removed without notice.
|
1415
|
-
*
|
1416
|
-
* It has no effect with the Rust crypto implementation.
|
1417
|
-
*
|
1418
|
-
* @param value - whether error on unknown devices
|
1419
|
-
*
|
1420
|
-
* ```ts
|
1421
|
-
* client.getCrypto().globalErrorOnUnknownDevices = value;
|
1422
|
-
* ```
|
1423
|
-
*/
|
1424
|
-
setGlobalErrorOnUnknownDevices(value: boolean): void;
|
1425
|
-
/**
|
1426
|
-
* @returns whether to error on unknown devices
|
1427
|
-
*
|
1428
|
-
* This API is currently UNSTABLE and may change or be removed without notice.
|
1429
|
-
*/
|
1430
|
-
getGlobalErrorOnUnknownDevices(): boolean;
|
1431
|
-
/**
|
1432
|
-
* Get the ID of one of the user's cross-signing keys
|
1433
|
-
*
|
1434
|
-
* @param type - The type of key to get the ID of. One of
|
1435
|
-
* "master", "self_signing", or "user_signing". Defaults to "master".
|
1436
|
-
*
|
1437
|
-
* @returns the key ID
|
1438
|
-
* @deprecated Not supported for Rust Cryptography. prefer {@link Crypto.CryptoApi#getCrossSigningKeyId}
|
1439
|
-
*/
|
1440
|
-
getCrossSigningId(type?: CrossSigningKey | string): string | null;
|
1441
|
-
/**
|
1442
|
-
* Get the cross signing information for a given user.
|
1443
|
-
*
|
1444
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
1445
|
-
*
|
1446
|
-
* @param userId - the user ID to get the cross-signing info for.
|
1447
|
-
*
|
1448
|
-
* @returns the cross signing information for the user.
|
1449
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#userHasCrossSigningKeys}
|
1450
|
-
*/
|
1451
|
-
getStoredCrossSigningForUser(userId: string): CrossSigningInfo | null;
|
1452
|
-
/**
|
1453
|
-
* Check whether a given user is trusted.
|
1454
|
-
*
|
1455
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
1456
|
-
*
|
1457
|
-
* @param userId - The ID of the user to check.
|
1458
|
-
*
|
1459
|
-
* @deprecated Use {@link Crypto.CryptoApi.getUserVerificationStatus | `CryptoApi.getUserVerificationStatus`}
|
1460
|
-
*/
|
1461
|
-
checkUserTrust(userId: string): UserTrustLevel;
|
1462
|
-
/**
|
1463
|
-
* Check whether a given device is trusted.
|
1464
|
-
*
|
1465
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
1466
|
-
*
|
1467
|
-
* @param userId - The ID of the user whose devices is to be checked.
|
1468
|
-
* @param deviceId - The ID of the device to check
|
1469
|
-
*
|
1470
|
-
* @deprecated Use {@link Crypto.CryptoApi.getDeviceVerificationStatus | `CryptoApi.getDeviceVerificationStatus`}
|
1471
|
-
*/
|
1472
|
-
checkDeviceTrust(userId: string, deviceId: string): DeviceTrustLevel;
|
1473
|
-
/**
|
1474
|
-
* Check whether one of our own devices is cross-signed by our
|
1475
|
-
* user's stored keys, regardless of whether we trust those keys yet.
|
1476
|
-
*
|
1477
|
-
* @param deviceId - The ID of the device to check
|
1478
|
-
*
|
1479
|
-
* @returns true if the device is cross-signed
|
1480
|
-
*
|
1481
|
-
* @deprecated Not supported for Rust Cryptography.
|
1482
|
-
*/
|
1483
|
-
checkIfOwnDeviceCrossSigned(deviceId: string): boolean;
|
1484
|
-
/**
|
1485
|
-
* Check the copy of our cross-signing key that we have in the device list and
|
1486
|
-
* see if we can get the private key. If so, mark it as trusted.
|
1487
|
-
* @param opts - ICheckOwnCrossSigningTrustOpts object
|
1488
|
-
*
|
1489
|
-
* @deprecated Unneeded for the new crypto
|
1490
|
-
*/
|
1491
|
-
checkOwnCrossSigningTrust(opts?: ICheckOwnCrossSigningTrustOpts): Promise<void>;
|
1492
|
-
/**
|
1493
|
-
* Checks that a given cross-signing private key matches a given public key.
|
1494
|
-
* This can be used by the getCrossSigningKey callback to verify that the
|
1495
|
-
* private key it is about to supply is the one that was requested.
|
1496
|
-
* @param privateKey - The private key
|
1497
|
-
* @param expectedPublicKey - The public key
|
1498
|
-
* @returns true if the key matches, otherwise false
|
1499
|
-
*
|
1500
|
-
* @deprecated Not supported for Rust Cryptography.
|
1501
|
-
*/
|
1502
|
-
checkCrossSigningPrivateKey(privateKey: Uint8Array, expectedPublicKey: string): boolean;
|
1503
|
-
/**
|
1504
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#requestDeviceVerification}.
|
1505
|
-
*/
|
1506
|
-
legacyDeviceVerification(userId: string, deviceId: string, method: string): Promise<VerificationRequest>;
|
1507
|
-
/**
|
1508
|
-
* Perform any background tasks that can be done before a message is ready to
|
1509
|
-
* send, in order to speed up sending of the message.
|
1510
|
-
* @param room - the room the event is in
|
1511
|
-
*
|
1512
|
-
* @deprecated Prefer {@link CryptoApi.prepareToEncrypt | `CryptoApi.prepareToEncrypt`}:
|
1513
|
-
*
|
1514
|
-
* ```javascript
|
1515
|
-
* client.getCrypto().prepareToEncrypt(room);
|
1516
|
-
* ```
|
1517
|
-
*/
|
1518
|
-
prepareToEncrypt(room: Room): void;
|
1519
|
-
/**
|
1520
|
-
* Checks if the user has previously published cross-signing keys
|
1521
|
-
*
|
1522
|
-
* This means downloading the devicelist for the user and checking if the list includes
|
1523
|
-
* the cross-signing pseudo-device.
|
1524
|
-
*
|
1525
|
-
* @deprecated Prefer {@link CryptoApi.userHasCrossSigningKeys | `CryptoApi.userHasCrossSigningKeys`}:
|
1526
|
-
*
|
1527
|
-
* ```javascript
|
1528
|
-
* result = client.getCrypto().userHasCrossSigningKeys();
|
1529
|
-
* ```
|
1530
|
-
*/
|
1531
|
-
userHasCrossSigningKeys(): Promise<boolean>;
|
1532
|
-
/**
|
1533
|
-
* Checks whether cross signing:
|
1534
|
-
* - is enabled on this account and trusted by this device
|
1535
|
-
* - has private keys either cached locally or stored in secret storage
|
1536
|
-
*
|
1537
|
-
* If this function returns false, bootstrapCrossSigning() can be used
|
1538
|
-
* to fix things such that it returns true. That is to say, after
|
1539
|
-
* bootstrapCrossSigning() completes successfully, this function should
|
1540
|
-
* return true.
|
1541
|
-
* @returns True if cross-signing is ready to be used on this device
|
1542
|
-
* @deprecated Prefer {@link CryptoApi.isCrossSigningReady | `CryptoApi.isCrossSigningReady`}:
|
1543
|
-
*/
|
1544
|
-
isCrossSigningReady(): Promise<boolean>;
|
1545
|
-
/**
|
1546
|
-
* Bootstrap cross-signing by creating keys if needed. If everything is already
|
1547
|
-
* set up, then no changes are made, so this is safe to run to ensure
|
1548
|
-
* cross-signing is ready for use.
|
1549
|
-
*
|
1550
|
-
* This function:
|
1551
|
-
* - creates new cross-signing keys if they are not found locally cached nor in
|
1552
|
-
* secret storage (if it has been set up)
|
1553
|
-
*
|
1554
|
-
* @deprecated Prefer {@link CryptoApi.bootstrapCrossSigning | `CryptoApi.bootstrapCrossSigning`}.
|
1555
|
-
*/
|
1556
|
-
bootstrapCrossSigning(opts: BootstrapCrossSigningOpts): Promise<void>;
|
1557
|
-
/**
|
1558
|
-
* Whether to trust a others users signatures of their devices.
|
1559
|
-
* If false, devices will only be considered 'verified' if we have
|
1560
|
-
* verified that device individually (effectively disabling cross-signing).
|
1561
|
-
*
|
1562
|
-
* Default: true
|
1563
|
-
*
|
1564
|
-
* @returns True if trusting cross-signed devices
|
1565
|
-
*
|
1566
|
-
* @deprecated Prefer {@link CryptoApi.getTrustCrossSignedDevices | `CryptoApi.getTrustCrossSignedDevices`}.
|
1567
|
-
*/
|
1568
|
-
getCryptoTrustCrossSignedDevices(): boolean;
|
1569
|
-
/**
|
1570
|
-
* See getCryptoTrustCrossSignedDevices
|
1571
|
-
*
|
1572
|
-
* @param val - True to trust cross-signed devices
|
1573
|
-
*
|
1574
|
-
* @deprecated Prefer {@link CryptoApi.setTrustCrossSignedDevices | `CryptoApi.setTrustCrossSignedDevices`}.
|
1575
|
-
*/
|
1576
|
-
setCryptoTrustCrossSignedDevices(val: boolean): void;
|
1577
|
-
/**
|
1578
|
-
* Counts the number of end to end session keys that are waiting to be backed up
|
1579
|
-
* @returns Promise which resolves to the number of sessions requiring backup
|
1580
|
-
*
|
1581
|
-
* @deprecated Not supported for Rust Cryptography.
|
1582
|
-
*/
|
1583
|
-
countSessionsNeedingBackup(): Promise<number>;
|
1584
|
-
/**
|
1585
|
-
* Get information about the encryption of an event
|
1586
|
-
*
|
1587
|
-
* @param event - event to be checked
|
1588
|
-
* @returns The event information.
|
1589
|
-
* @deprecated Prefer {@link Crypto.CryptoApi.getEncryptionInfoForEvent | `CryptoApi.getEncryptionInfoForEvent`}.
|
1590
|
-
*/
|
1591
|
-
getEventEncryptionInfo(event: MatrixEvent): IEncryptedEventInfo;
|
1592
|
-
/**
|
1593
|
-
* Create a recovery key from a user-supplied passphrase.
|
1594
|
-
*
|
1595
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1596
|
-
*
|
1597
|
-
* @param password - Passphrase string that can be entered by the user
|
1598
|
-
* when restoring the backup as an alternative to entering the recovery key.
|
1599
|
-
* Optional.
|
1600
|
-
* @returns Object with public key metadata, encoded private
|
1601
|
-
* recovery key which should be disposed of after displaying to the user,
|
1602
|
-
* and raw private key to avoid round tripping if needed.
|
1603
|
-
*
|
1604
|
-
* @deprecated Prefer {@link CryptoApi.createRecoveryKeyFromPassphrase | `CryptoApi.createRecoveryKeyFromPassphrase`}.
|
1605
|
-
*/
|
1606
|
-
createRecoveryKeyFromPassphrase(password?: string): Promise<IRecoveryKey>;
|
1607
|
-
/**
|
1608
|
-
* Checks whether secret storage:
|
1609
|
-
* - is enabled on this account
|
1610
|
-
* - is storing cross-signing private keys
|
1611
|
-
* - is storing session backup key (if enabled)
|
1612
|
-
*
|
1613
|
-
* If this function returns false, bootstrapSecretStorage() can be used
|
1614
|
-
* to fix things such that it returns true. That is to say, after
|
1615
|
-
* bootstrapSecretStorage() completes successfully, this function should
|
1616
|
-
* return true.
|
1617
|
-
*
|
1618
|
-
* @returns True if secret storage is ready to be used on this device
|
1619
|
-
* @deprecated Prefer {@link CryptoApi.isSecretStorageReady | `CryptoApi.isSecretStorageReady`}.
|
1620
|
-
*/
|
1621
|
-
isSecretStorageReady(): Promise<boolean>;
|
1622
|
-
/**
|
1623
|
-
* Bootstrap Secure Secret Storage if needed by creating a default key. If everything is
|
1624
|
-
* already set up, then no changes are made, so this is safe to run to ensure secret
|
1625
|
-
* storage is ready for use.
|
1626
|
-
*
|
1627
|
-
* This function
|
1628
|
-
* - creates a new Secure Secret Storage key if no default key exists
|
1629
|
-
* - if a key backup exists, it is migrated to store the key in the Secret
|
1630
|
-
* Storage
|
1631
|
-
* - creates a backup if none exists, and one is requested
|
1632
|
-
* - migrates Secure Secret Storage to use the latest algorithm, if an outdated
|
1633
|
-
* algorithm is found
|
1634
|
-
*
|
1635
|
-
* @deprecated Use {@link CryptoApi.bootstrapSecretStorage | `CryptoApi.bootstrapSecretStorage`}.
|
1636
|
-
*/
|
1637
|
-
bootstrapSecretStorage(opts: ICreateSecretStorageOpts): Promise<void>;
|
1638
|
-
/**
|
1639
|
-
* Add a key for encrypting secrets.
|
1640
|
-
*
|
1641
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1642
|
-
*
|
1643
|
-
* @param algorithm - the algorithm used by the key
|
1644
|
-
* @param opts - the options for the algorithm. The properties used
|
1645
|
-
* depend on the algorithm given.
|
1646
|
-
* @param keyName - the name of the key. If not given, a random name will be generated.
|
1647
|
-
*
|
1648
|
-
* @returns An object with:
|
1649
|
-
* keyId: the ID of the key
|
1650
|
-
* keyInfo: details about the key (iv, mac, passphrase)
|
1651
|
-
*
|
1652
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#addKey}.
|
1653
|
-
*/
|
1654
|
-
addSecretStorageKey(algorithm: string, opts: AddSecretStorageKeyOpts, keyName?: string): Promise<{
|
1655
|
-
keyId: string;
|
1656
|
-
keyInfo: SecretStorageKeyDescription;
|
1657
|
-
}>;
|
1658
|
-
/**
|
1659
|
-
* Check whether we have a key with a given ID.
|
1660
|
-
*
|
1661
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1662
|
-
*
|
1663
|
-
* @param keyId - The ID of the key to check
|
1664
|
-
* for. Defaults to the default key ID if not provided.
|
1665
|
-
* @returns Whether we have the key.
|
1666
|
-
*
|
1667
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#hasKey}.
|
1668
|
-
*/
|
1669
|
-
hasSecretStorageKey(keyId?: string): Promise<boolean>;
|
1670
|
-
/**
|
1671
|
-
* Store an encrypted secret on the server.
|
1672
|
-
*
|
1673
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1674
|
-
*
|
1675
|
-
* @param name - The name of the secret
|
1676
|
-
* @param secret - The secret contents.
|
1677
|
-
* @param keys - The IDs of the keys to use to encrypt the secret or null/undefined
|
1678
|
-
* to use the default (will throw if no default key is set).
|
1679
|
-
*
|
1680
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#store}.
|
1681
|
-
*/
|
1682
|
-
storeSecret(name: string, secret: string, keys?: string[]): Promise<void>;
|
1683
|
-
/**
|
1684
|
-
* Get a secret from storage.
|
1685
|
-
*
|
1686
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1687
|
-
*
|
1688
|
-
* @param name - the name of the secret
|
1689
|
-
*
|
1690
|
-
* @returns the contents of the secret
|
1691
|
-
*
|
1692
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#get}.
|
1693
|
-
*/
|
1694
|
-
getSecret(name: string): Promise<string | undefined>;
|
1695
|
-
/**
|
1696
|
-
* Check if a secret is stored on the server.
|
1697
|
-
*
|
1698
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1699
|
-
*
|
1700
|
-
* @param name - the name of the secret
|
1701
|
-
* @returns map of key name to key info the secret is encrypted
|
1702
|
-
* with, or null if it is not present or not encrypted with a trusted
|
1703
|
-
* key
|
1704
|
-
*
|
1705
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#isStored}.
|
1706
|
-
*/
|
1707
|
-
isSecretStored(name: string): Promise<Record<string, SecretStorageKeyDescription> | null>;
|
1708
|
-
/**
|
1709
|
-
* Request a secret from another device.
|
1710
|
-
*
|
1711
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1712
|
-
*
|
1713
|
-
* @param name - the name of the secret to request
|
1714
|
-
* @param devices - the devices to request the secret from
|
1715
|
-
*
|
1716
|
-
* @returns the secret request object
|
1717
|
-
* @deprecated Not supported for Rust Cryptography.
|
1718
|
-
*/
|
1719
|
-
requestSecret(name: string, devices: string[]): ISecretRequest;
|
1720
|
-
/**
|
1721
|
-
* Get the current default key ID for encrypting secrets.
|
1722
|
-
*
|
1723
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1724
|
-
*
|
1725
|
-
* @returns The default key ID or null if no default key ID is set
|
1726
|
-
*
|
1727
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#getDefaultKeyId}.
|
1728
|
-
*/
|
1729
|
-
getDefaultSecretStorageKeyId(): Promise<string | null>;
|
1730
|
-
/**
|
1731
|
-
* Set the current default key ID for encrypting secrets.
|
1732
|
-
*
|
1733
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1734
|
-
*
|
1735
|
-
* @param keyId - The new default key ID
|
1736
|
-
*
|
1737
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#setDefaultKeyId}.
|
1738
|
-
*/
|
1739
|
-
setDefaultSecretStorageKeyId(keyId: string): Promise<void>;
|
1740
|
-
/**
|
1741
|
-
* Checks that a given secret storage private key matches a given public key.
|
1742
|
-
* This can be used by the getSecretStorageKey callback to verify that the
|
1743
|
-
* private key it is about to supply is the one that was requested.
|
1744
|
-
*
|
1745
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1746
|
-
*
|
1747
|
-
* @param privateKey - The private key
|
1748
|
-
* @param expectedPublicKey - The public key
|
1749
|
-
* @returns true if the key matches, otherwise false
|
1750
|
-
*
|
1751
|
-
* @deprecated The use of asymmetric keys for SSSS is deprecated.
|
1752
|
-
* Use {@link SecretStorage.ServerSideSecretStorage#checkKey} for symmetric keys.
|
1753
|
-
*/
|
1754
|
-
checkSecretStoragePrivateKey(privateKey: Uint8Array, expectedPublicKey: string): boolean;
|
1755
|
-
/**
|
1756
|
-
* Get e2e information on the device that sent an event
|
1757
|
-
*
|
1758
|
-
* @param event - event to be checked
|
1759
|
-
* @deprecated Not supported for Rust Cryptography.
|
1760
|
-
*/
|
1761
|
-
getEventSenderDeviceInfo(event: MatrixEvent): Promise<DeviceInfo | null>;
|
1762
|
-
/**
|
1763
|
-
* Check if the sender of an event is verified
|
1764
|
-
*
|
1765
|
-
* @param event - event to be checked
|
1766
|
-
*
|
1767
|
-
* @returns true if the sender of this event has been verified using
|
1768
|
-
* {@link MatrixClient#setDeviceVerified}.
|
1769
|
-
*
|
1770
|
-
* @deprecated Not supported for Rust Cryptography.
|
1771
|
-
*/
|
1772
|
-
isEventSenderVerified(event: MatrixEvent): Promise<boolean>;
|
1773
|
-
/**
|
1774
|
-
* Get outgoing room key request for this event if there is one.
|
1775
|
-
* @param event - The event to check for
|
1776
|
-
*
|
1777
|
-
* @returns A room key request, or null if there is none
|
1778
|
-
*
|
1779
|
-
* @deprecated Not supported for Rust Cryptography.
|
1780
|
-
*/
|
1781
|
-
getOutgoingRoomKeyRequest(event: MatrixEvent): Promise<OutgoingRoomKeyRequest | null>;
|
1782
|
-
/**
|
1783
|
-
* Cancel a room key request for this event if one is ongoing and resend the
|
1784
|
-
* request.
|
1785
|
-
* @param event - event of which to cancel and resend the room
|
1786
|
-
* key request.
|
1787
|
-
* @returns A promise that will resolve when the key request is queued
|
1788
|
-
*
|
1789
|
-
* @deprecated Not supported for Rust Cryptography.
|
1790
|
-
*/
|
1791
|
-
cancelAndResendEventRoomKeyRequest(event: MatrixEvent): Promise<void>;
|
1792
|
-
/**
|
1793
|
-
* Enable end-to-end encryption for a room. This does not modify room state.
|
1794
|
-
* Any messages sent before the returned promise resolves will be sent unencrypted.
|
1795
|
-
* @param roomId - The room ID to enable encryption in.
|
1796
|
-
* @param config - The encryption config for the room.
|
1797
|
-
* @returns A promise that will resolve when encryption is set up.
|
1798
|
-
*
|
1799
|
-
* @deprecated Not supported for Rust Cryptography. To enable encryption in a room, send an `m.room.encryption`
|
1800
|
-
* state event.
|
1801
|
-
*/
|
1802
|
-
setRoomEncryption(roomId: string, config: IRoomEncryption): Promise<void>;
|
1803
|
-
/**
|
1804
|
-
* Whether encryption is enabled for a room.
|
1805
|
-
* @param roomId - the room id to query.
|
1806
|
-
* @returns whether encryption is enabled.
|
1807
|
-
*
|
1808
|
-
* @deprecated Not correctly supported for Rust Cryptography. Use {@link CryptoApi.isEncryptionEnabledInRoom} and/or
|
1809
|
-
* {@link Room.hasEncryptionStateEvent}.
|
1810
|
-
*/
|
1811
|
-
isRoomEncrypted(roomId: string): boolean;
|
1812
|
-
/**
|
1813
|
-
* Encrypts and sends a given object via Olm to-device messages to a given
|
1814
|
-
* set of devices.
|
1815
|
-
*
|
1816
|
-
* @param userDeviceInfoArr - list of deviceInfo objects representing the devices to send to
|
1817
|
-
*
|
1818
|
-
* @param payload - fields to include in the encrypted payload
|
1819
|
-
*
|
1820
|
-
* @returns Promise which
|
1821
|
-
* resolves once the message has been encrypted and sent to the given
|
1822
|
-
* userDeviceMap, and returns the `{ contentMap, deviceInfoByDeviceId }`
|
1823
|
-
* of the successfully sent messages.
|
1824
|
-
*
|
1825
|
-
* @deprecated Instead use {@link CryptoApi.encryptToDeviceMessages} followed by {@link queueToDevice}.
|
1826
|
-
*/
|
1827
|
-
encryptAndSendToDevices(userDeviceInfoArr: IOlmDevice<DeviceInfo>[], payload: object): Promise<void>;
|
1828
|
-
/**
|
1829
|
-
* Forces the current outbound group session to be discarded such
|
1830
|
-
* that another one will be created next time an event is sent.
|
1831
|
-
*
|
1832
|
-
* @param roomId - The ID of the room to discard the session for
|
1833
|
-
*
|
1834
|
-
* @deprecated Prefer {@link CryptoApi.forceDiscardSession | `CryptoApi.forceDiscardSession`}:
|
1835
|
-
*/
|
1836
|
-
forceDiscardSession(roomId: string): void;
|
1837
|
-
/**
|
1838
|
-
* Get a list containing all of the room keys
|
1839
|
-
*
|
1840
|
-
* This should be encrypted before returning it to the user.
|
1841
|
-
*
|
1842
|
-
* @returns a promise which resolves to a list of session export objects
|
1843
|
-
*
|
1844
|
-
* @deprecated Prefer {@link CryptoApi.exportRoomKeys | `CryptoApi.exportRoomKeys`}:
|
1845
|
-
*
|
1846
|
-
* ```javascript
|
1847
|
-
* sessionData = await client.getCrypto().exportRoomKeys();
|
1848
|
-
* ```
|
1849
|
-
*/
|
1850
|
-
exportRoomKeys(): Promise<IMegolmSessionData[]>;
|
1851
|
-
/**
|
1852
|
-
* Import a list of room keys previously exported by exportRoomKeys
|
1853
|
-
*
|
1854
|
-
* @param keys - a list of session export objects
|
1855
|
-
* @param opts - options object
|
1856
|
-
*
|
1857
|
-
* @returns a promise which resolves when the keys have been imported
|
1858
|
-
*
|
1859
|
-
* @deprecated Prefer {@link CryptoApi.importRoomKeys | `CryptoApi.importRoomKeys`}:
|
1860
|
-
* ```javascript
|
1861
|
-
* await client.getCrypto()?.importRoomKeys([..]);
|
1862
|
-
* ```
|
1863
|
-
*/
|
1864
|
-
importRoomKeys(keys: IMegolmSessionData[], opts?: ImportRoomKeysOpts): Promise<void>;
|
1865
|
-
/**
|
1866
|
-
* Force a re-check of the local key backup status against
|
1867
|
-
* what's on the server.
|
1868
|
-
*
|
1869
|
-
* @returns Object with backup info (as returned by
|
1870
|
-
* getKeyBackupVersion) in backupInfo and
|
1871
|
-
* trust information (as returned by isKeyBackupTrusted)
|
1872
|
-
* in trustInfo.
|
1873
|
-
*
|
1874
|
-
* @deprecated Prefer {@link Crypto.CryptoApi.checkKeyBackupAndEnable}.
|
1875
|
-
*/
|
1876
|
-
checkKeyBackup(): Promise<IKeyBackupCheck | null>;
|
1877
|
-
/**
|
1878
|
-
* Get information about the current key backup from the server.
|
1879
|
-
*
|
1880
|
-
* Performs some basic validity checks on the shape of the result, and raises an error if it is not as expected.
|
1881
|
-
*
|
1882
|
-
* **Note**: there is no (supported) way to distinguish between "failure to talk to the server" and "another client
|
1883
|
-
* uploaded a key backup version using an algorithm I don't understand.
|
1884
|
-
*
|
1885
|
-
* @returns Information object from API, or null if no backup is present on the server.
|
1886
|
-
*
|
1887
|
-
* @deprecated Prefer {@link CryptoApi.getKeyBackupInfo}.
|
1888
|
-
*/
|
1889
|
-
getKeyBackupVersion(): Promise<IKeyBackupInfo | null>;
|
1890
|
-
/**
|
1891
|
-
* @param info - key backup info dict from getKeyBackupVersion()
|
1892
|
-
*
|
1893
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.isKeyBackupTrusted | `CryptoApi.isKeyBackupTrusted`}.
|
1894
|
-
*/
|
1895
|
-
isKeyBackupTrusted(info: IKeyBackupInfo): Promise<TrustInfo>;
|
1896
|
-
/**
|
1897
|
-
* @returns true if the client is configured to back up keys to
|
1898
|
-
* the server, otherwise false. If we haven't completed a successful check
|
1899
|
-
* of key backup status yet, returns null.
|
1900
|
-
*
|
1901
|
-
* @deprecated Not supported for Rust Cryptography. Prefer direct access to {@link Crypto.CryptoApi.getActiveSessionBackupVersion}:
|
1902
|
-
*
|
1903
|
-
* ```javascript
|
1904
|
-
* let enabled = (await client.getCrypto().getActiveSessionBackupVersion()) !== null;
|
1905
|
-
* ```
|
1906
|
-
*/
|
1907
|
-
getKeyBackupEnabled(): boolean | null;
|
1908
|
-
/**
|
1909
|
-
* Enable backing up of keys, using data previously returned from
|
1910
|
-
* getKeyBackupVersion.
|
1911
|
-
*
|
1912
|
-
* @param info - Backup information object as returned by getKeyBackupVersion
|
1913
|
-
* @returns Promise which resolves when complete.
|
1914
|
-
*
|
1915
|
-
* @deprecated Do not call this directly. Instead call {@link Crypto.CryptoApi.checkKeyBackupAndEnable}.
|
1916
|
-
*/
|
1917
|
-
enableKeyBackup(info: IKeyBackupInfo): Promise<void>;
|
1918
|
-
/**
|
1919
|
-
* Disable backing up of keys.
|
1920
|
-
*
|
1921
|
-
* @deprecated Not supported for Rust Cryptography. It should be unnecessary to disable key backup.
|
1922
|
-
*/
|
1923
|
-
disableKeyBackup(): void;
|
1924
|
-
/**
|
1925
|
-
* Set up the data required to create a new backup version. The backup version
|
1926
|
-
* will not be created and enabled until createKeyBackupVersion is called.
|
1927
|
-
*
|
1928
|
-
* @param password - Passphrase string that can be entered by the user
|
1929
|
-
* when restoring the backup as an alternative to entering the recovery key.
|
1930
|
-
* Optional.
|
1931
|
-
*
|
1932
|
-
* @returns Object that can be passed to createKeyBackupVersion and
|
1933
|
-
* additionally has a 'recovery_key' member with the user-facing recovery key string.
|
1934
|
-
*
|
1935
|
-
* @deprecated Not supported for Rust cryptography. Use {@link Crypto.CryptoApi.resetKeyBackup | `CryptoApi.resetKeyBackup`}.
|
1936
|
-
*/
|
1937
|
-
prepareKeyBackupVersion(password?: string | Uint8Array | null, opts?: IKeyBackupPrepareOpts): Promise<Pick<IPreparedKeyBackupVersion, "algorithm" | "auth_data" | "recovery_key">>;
|
1938
|
-
/**
|
1939
|
-
* Check whether the key backup private key is stored in secret storage.
|
1940
|
-
* @returns map of key name to key info the secret is
|
1941
|
-
* encrypted with, or null if it is not present or not encrypted with a
|
1942
|
-
* trusted key
|
1943
|
-
*/
|
1944
|
-
isKeyBackupKeyStored(): Promise<Record<string, SecretStorageKeyDescription> | null>;
|
1945
|
-
/**
|
1946
|
-
* Create a new key backup version and enable it, using the information return
|
1947
|
-
* from prepareKeyBackupVersion.
|
1948
|
-
*
|
1949
|
-
* @param info - Info object from prepareKeyBackupVersion
|
1950
|
-
* @returns Object with 'version' param indicating the version created
|
1951
|
-
*
|
1952
|
-
* @deprecated Use {@link Crypto.CryptoApi.resetKeyBackup | `CryptoApi.resetKeyBackup`}.
|
1953
|
-
*/
|
1954
|
-
createKeyBackupVersion(info: IKeyBackupInfo): Promise<IKeyBackupInfo>;
|
1955
|
-
/**
|
1956
|
-
* @deprecated Use {@link Crypto.CryptoApi.deleteKeyBackupVersion | `CryptoApi.deleteKeyBackupVersion`}.
|
1957
|
-
*/
|
1958
|
-
deleteKeyBackupVersion(version: string): Promise<void>;
|
1959
|
-
private makeKeyBackupPath;
|
1960
|
-
/**
|
1961
|
-
* Back up session keys to the homeserver.
|
1962
|
-
* @param roomId - ID of the room that the keys are for Optional.
|
1963
|
-
* @param sessionId - ID of the session that the keys are for Optional.
|
1964
|
-
* @param version - backup version Optional.
|
1965
|
-
* @param data - Object keys to send
|
1966
|
-
* @returns a promise that will resolve when the keys
|
1967
|
-
* are uploaded
|
1968
|
-
*
|
1969
|
-
* @deprecated Not supported for Rust Cryptography.
|
1970
|
-
*/
|
1971
|
-
sendKeyBackup(roomId: undefined, sessionId: undefined, version: string | undefined, data: IKeyBackup): Promise<void>;
|
1972
|
-
sendKeyBackup(roomId: string, sessionId: undefined, version: string | undefined, data: IKeyBackup): Promise<void>;
|
1973
|
-
sendKeyBackup(roomId: string, sessionId: string, version: string | undefined, data: IKeyBackup): Promise<void>;
|
1974
|
-
/**
|
1975
|
-
* Marks all group sessions as needing to be backed up and schedules them to
|
1976
|
-
* upload in the background as soon as possible.
|
1977
|
-
*
|
1978
|
-
* @deprecated Not supported for Rust Cryptography. This is done automatically as part of
|
1979
|
-
* {@link CryptoApi.resetKeyBackup}, so there is probably no need to call this manually.
|
1980
|
-
*/
|
1981
|
-
scheduleAllGroupSessionsForBackup(): Promise<void>;
|
1982
|
-
/**
|
1983
|
-
* Marks all group sessions as needing to be backed up without scheduling
|
1984
|
-
* them to upload in the background.
|
1985
|
-
*
|
1986
|
-
* (This is done automatically as part of {@link CryptoApi.resetKeyBackup},
|
1987
|
-
* so there is probably no need to call this manually.)
|
1988
|
-
*
|
1989
|
-
* @returns Promise which resolves to the number of sessions requiring a backup.
|
1990
|
-
* @deprecated Not supported for Rust Cryptography.
|
1991
|
-
*/
|
1992
|
-
flagAllGroupSessionsForBackup(): Promise<number>;
|
1993
|
-
/**
|
1994
|
-
* Return true if recovery key is valid.
|
1995
|
-
* Try to decode the recovery key and check if it's successful.
|
1996
|
-
* @param recoveryKey
|
1997
|
-
* @deprecated Use {@link decodeRecoveryKey} directly
|
1998
|
-
*/
|
1999
|
-
isValidRecoveryKey(recoveryKey: string): boolean;
|
2000
|
-
/**
|
2001
|
-
* Get the raw key for a key backup from the password
|
2002
|
-
* Used when migrating key backups into SSSS
|
2003
|
-
*
|
2004
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
2005
|
-
*
|
2006
|
-
* @param password - Passphrase
|
2007
|
-
* @param backupInfo - Backup metadata from `checkKeyBackup`
|
2008
|
-
* @returns key backup key
|
2009
|
-
* @deprecated Deriving a backup key from a passphrase is not part of the matrix spec. Instead, a random key is generated and stored/shared via 4S.
|
2010
|
-
*/
|
2011
|
-
keyBackupKeyFromPassword(password: string, backupInfo: IKeyBackupInfo): Promise<Uint8Array>;
|
2012
|
-
/**
|
2013
|
-
* Get the raw key for a key backup from the recovery key
|
2014
|
-
* Used when migrating key backups into SSSS
|
2015
|
-
*
|
2016
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
2017
|
-
*
|
2018
|
-
* @param recoveryKey - The recovery key
|
2019
|
-
* @returns key backup key
|
2020
|
-
* @deprecated Use {@link decodeRecoveryKey} directly
|
2021
|
-
*/
|
2022
|
-
keyBackupKeyFromRecoveryKey(recoveryKey: string): Uint8Array;
|
2023
|
-
/**
|
2024
|
-
* Restore from an existing key backup via a passphrase.
|
2025
|
-
*
|
2026
|
-
* @param password - Passphrase
|
2027
|
-
* @param targetRoomId - Room ID to target a specific room.
|
2028
|
-
* Restores all rooms if omitted.
|
2029
|
-
* @param targetSessionId - Session ID to target a specific session.
|
2030
|
-
* Restores all sessions if omitted.
|
2031
|
-
* @param backupInfo - Backup metadata from `getKeyBackupVersion` or `checkKeyBackup`.`backupInfo`
|
2032
|
-
* @param opts - Optional params such as callbacks
|
2033
|
-
* @returns Status of restoration with `total` and `imported`
|
2034
|
-
* key counts.
|
2035
|
-
*
|
2036
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
|
2037
|
-
*/
|
2038
|
-
restoreKeyBackupWithPassword(password: string, targetRoomId: undefined, targetSessionId: undefined, backupInfo: IKeyBackupInfo, opts: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2039
|
-
/**
|
2040
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
|
2041
|
-
*/
|
2042
|
-
restoreKeyBackupWithPassword(password: string, targetRoomId: string, targetSessionId: undefined, backupInfo: IKeyBackupInfo, opts: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2043
|
-
/**
|
2044
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
|
2045
|
-
*/
|
2046
|
-
restoreKeyBackupWithPassword(password: string, targetRoomId: string, targetSessionId: string, backupInfo: IKeyBackupInfo, opts: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2047
|
-
/**
|
2048
|
-
* Restore from an existing key backup via a private key stored in secret
|
2049
|
-
* storage.
|
2050
|
-
*
|
2051
|
-
* @param backupInfo - Backup metadata from `checkKeyBackup`
|
2052
|
-
* @param targetRoomId - Room ID to target a specific room.
|
2053
|
-
* Restores all rooms if omitted.
|
2054
|
-
* @param targetSessionId - Session ID to target a specific session.
|
2055
|
-
* Restores all sessions if omitted.
|
2056
|
-
* @param opts - Optional params such as callbacks
|
2057
|
-
* @returns Status of restoration with `total` and `imported`
|
2058
|
-
* key counts.
|
2059
|
-
*
|
2060
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2061
|
-
*/
|
2062
|
-
restoreKeyBackupWithSecretStorage(backupInfo: IKeyBackupInfo, targetRoomId?: string, targetSessionId?: string, opts?: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2063
|
-
/**
|
2064
|
-
* Restore from an existing key backup via an encoded recovery key.
|
2065
|
-
*
|
2066
|
-
* @param recoveryKey - Encoded recovery key
|
2067
|
-
* @param targetRoomId - Room ID to target a specific room.
|
2068
|
-
* Restores all rooms if omitted.
|
2069
|
-
* @param targetSessionId - Session ID to target a specific session.
|
2070
|
-
* Restores all sessions if omitted.
|
2071
|
-
* @param backupInfo - Backup metadata from `checkKeyBackup`
|
2072
|
-
* @param opts - Optional params such as callbacks
|
2073
|
-
|
2074
|
-
* @returns Status of restoration with `total` and `imported`
|
2075
|
-
* key counts.
|
2076
|
-
*
|
2077
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2078
|
-
*/
|
2079
|
-
restoreKeyBackupWithRecoveryKey(recoveryKey: string, targetRoomId: undefined, targetSessionId: undefined, backupInfo: IKeyBackupInfo, opts?: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2080
|
-
/**
|
2081
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2082
|
-
*/
|
2083
|
-
restoreKeyBackupWithRecoveryKey(recoveryKey: string, targetRoomId: string, targetSessionId: undefined, backupInfo: IKeyBackupInfo, opts?: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2084
|
-
/**
|
2085
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2086
|
-
*/
|
2087
|
-
restoreKeyBackupWithRecoveryKey(recoveryKey: string, targetRoomId: string, targetSessionId: string, backupInfo: IKeyBackupInfo, opts?: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2088
|
-
/**
|
2089
|
-
* Restore from an existing key backup via a private key stored locally
|
2090
|
-
* @param targetRoomId
|
2091
|
-
* @param targetSessionId
|
2092
|
-
* @param backupInfo
|
2093
|
-
* @param opts
|
2094
|
-
*
|
2095
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2096
|
-
*/
|
2097
|
-
restoreKeyBackupWithCache(targetRoomId: undefined, targetSessionId: undefined, backupInfo: IKeyBackupInfo, opts?: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2098
|
-
/**
|
2099
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2100
|
-
*/
|
2101
|
-
restoreKeyBackupWithCache(targetRoomId: string, targetSessionId: undefined, backupInfo: IKeyBackupInfo, opts?: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2102
|
-
/**
|
2103
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2104
|
-
*/
|
2105
|
-
restoreKeyBackupWithCache(targetRoomId: string, targetSessionId: string, backupInfo: IKeyBackupInfo, opts?: IKeyBackupRestoreOpts): Promise<IKeyBackupRestoreResult>;
|
2106
|
-
private restoreKeyBackup;
|
2107
|
-
/**
|
2108
|
-
* This method calculates the total number of keys present in the response of a `/room_keys/keys` call.
|
2109
|
-
*
|
2110
|
-
* @param res - The response from the server containing the keys to be counted.
|
2111
|
-
*
|
2112
|
-
* @returns The total number of keys in the backup.
|
2113
|
-
*/
|
2114
|
-
private getTotalKeyCount;
|
2115
|
-
/**
|
2116
|
-
* This method handles the decryption of a full backup, i.e a call to `/room_keys/keys`.
|
2117
|
-
* It will decrypt the keys in chunks and call the `block` callback for each chunk.
|
2118
|
-
*
|
2119
|
-
* @param res - The response from the server containing the keys to be decrypted.
|
2120
|
-
* @param backupDecryptor - An instance of the BackupDecryptor class used to decrypt the keys.
|
2121
|
-
* @param chunkSize - The size of the chunks to be processed at a time.
|
2122
|
-
* @param block - A callback function that is called for each chunk of keys.
|
2123
|
-
*
|
2124
|
-
* @returns A promise that resolves when the decryption is complete.
|
2125
|
-
*/
|
2126
|
-
private handleDecryptionOfAFullBackup;
|
2127
|
-
deleteKeysFromBackup(roomId: undefined, sessionId: undefined, version?: string): Promise<void>;
|
2128
|
-
deleteKeysFromBackup(roomId: string, sessionId: undefined, version?: string): Promise<void>;
|
2129
|
-
deleteKeysFromBackup(roomId: string, sessionId: string, version?: string): Promise<void>;
|
2130
917
|
/**
|
2131
918
|
* Get the config for the media repository.
|
2132
919
|
* @returns Promise which resolves with an object containing the config.
|
@@ -2178,13 +965,13 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
2178
965
|
* @returns Promise which resolves: an empty object
|
2179
966
|
* @returns Rejects: with an error response.
|
2180
967
|
*/
|
2181
|
-
setAccountData(eventType:
|
968
|
+
setAccountData<K extends keyof AccountDataEvents>(eventType: K, content: AccountDataEvents[K] | Record<string, never>): Promise<{}>;
|
2182
969
|
/**
|
2183
970
|
* Get account data event of given type for the current user.
|
2184
971
|
* @param eventType - The event type
|
2185
972
|
* @returns The contents of the given account data event
|
2186
973
|
*/
|
2187
|
-
getAccountData(eventType:
|
974
|
+
getAccountData<K extends keyof AccountDataEvents>(eventType: K): MatrixEvent | undefined;
|
2188
975
|
/**
|
2189
976
|
* Get account data event of given type for the current user. This variant
|
2190
977
|
* gets account data directly from the homeserver if the local store is not
|
@@ -2193,10 +980,8 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
2193
980
|
* @returns Promise which resolves: The contents of the given account data event.
|
2194
981
|
* @returns Rejects: with an error response.
|
2195
982
|
*/
|
2196
|
-
getAccountDataFromServer<
|
2197
|
-
|
2198
|
-
}>(eventType: string): Promise<T | null>;
|
2199
|
-
deleteAccountData(eventType: string): Promise<void>;
|
983
|
+
getAccountDataFromServer<K extends keyof AccountDataEvents>(eventType: K): Promise<AccountDataEvents[K] | null>;
|
984
|
+
deleteAccountData(eventType: keyof AccountDataEvents): Promise<void>;
|
2200
985
|
/**
|
2201
986
|
* Gets the users that are ignored by this client
|
2202
987
|
* @returns The array of users that are ignored (empty if none)
|
@@ -2334,13 +1119,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
2334
1119
|
* @returns returns a promise which resolves with the result of the delayed send request
|
2335
1120
|
*/
|
2336
1121
|
protected encryptAndSendEvent(room: Room | null, event: MatrixEvent, delayOpts: SendDelayedEventRequestOpts): Promise<SendDelayedEventResponse>;
|
2337
|
-
private encryptEventIfNeeded;
|
2338
|
-
/**
|
2339
|
-
* Determine whether a given event should be encrypted when we send it to the given room.
|
2340
|
-
*
|
2341
|
-
* This takes into account event type and room configuration.
|
2342
|
-
*/
|
2343
|
-
private shouldEncryptEventForRoom;
|
2344
1122
|
/**
|
2345
1123
|
* Returns the eventType that should be used taking encryption into account
|
2346
1124
|
* for a given eventType.
|
@@ -2961,8 +1739,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
2961
1739
|
* @returns Rejects: with an error response.
|
2962
1740
|
*/
|
2963
1741
|
getOpenIdToken(): Promise<IOpenIDToken>;
|
2964
|
-
private startCallEventHandler;
|
2965
|
-
private startMatrixRTC;
|
2966
1742
|
/**
|
2967
1743
|
* Once the client has been initialised, we want to clear notifications we
|
2968
1744
|
* know for a fact should be here.
|
@@ -2974,24 +1750,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
2974
1750
|
* we have on record matches.
|
2975
1751
|
*/
|
2976
1752
|
private fixupRoomNotifications;
|
2977
|
-
/**
|
2978
|
-
* @returns Promise which resolves: ITurnServerResponse object
|
2979
|
-
* @returns Rejects: with an error response.
|
2980
|
-
*/
|
2981
|
-
turnServer(): Promise<ITurnServerResponse>;
|
2982
|
-
/**
|
2983
|
-
* Get the TURN servers for this homeserver.
|
2984
|
-
* @returns The servers or an empty list.
|
2985
|
-
*/
|
2986
|
-
getTurnServers(): ITurnServer[];
|
2987
|
-
/**
|
2988
|
-
* Get the unix timestamp (in milliseconds) at which the current
|
2989
|
-
* TURN credentials (from getTurnServers) expire
|
2990
|
-
* @returns The expiry timestamp in milliseconds
|
2991
|
-
*/
|
2992
|
-
getTurnServersExpiry(): number;
|
2993
|
-
get pollingTurnServers(): boolean;
|
2994
|
-
checkTurnServers(): Promise<boolean | undefined>;
|
2995
1753
|
/**
|
2996
1754
|
* Set whether to allow a fallback ICE server should be used for negotiating a
|
2997
1755
|
* WebRTC connection if the homeserver doesn't provide any servers. Defaults to
|
@@ -3120,13 +1878,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
3120
1878
|
nextBatch?: string | null;
|
3121
1879
|
prevBatch?: string | null;
|
3122
1880
|
}>;
|
3123
|
-
/**
|
3124
|
-
* The app may wish to see if we have a key cached without
|
3125
|
-
* triggering a user interaction.
|
3126
|
-
*
|
3127
|
-
* @deprecated Not supported for Rust Cryptography.
|
3128
|
-
*/
|
3129
|
-
getCrossSigningCacheCallbacks(): ICacheCallbacks | undefined;
|
3130
1881
|
/**
|
3131
1882
|
* Generates a random string suitable for use as a client secret. <strong>This
|
3132
1883
|
* method is experimental and may change.</strong>
|
@@ -3253,11 +2004,19 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
3253
2004
|
/**
|
3254
2005
|
* @returns Promise which resolves to a LoginResponse object
|
3255
2006
|
* @returns Rejects: with an error response.
|
2007
|
+
*
|
2008
|
+
* @deprecated This method has unintuitive behaviour: it updates the `MatrixClient` instance with *some* of the
|
2009
|
+
* returned credentials. Instead, call {@link loginRequest} and create a new `MatrixClient` instance using the
|
2010
|
+
* results. See https://github.com/matrix-org/matrix-js-sdk/issues/4502.
|
3256
2011
|
*/
|
3257
2012
|
login(loginType: LoginRequest["type"], data: Omit<LoginRequest, "type">): Promise<LoginResponse>;
|
3258
2013
|
/**
|
3259
2014
|
* @returns Promise which resolves to a LoginResponse object
|
3260
2015
|
* @returns Rejects: with an error response.
|
2016
|
+
*
|
2017
|
+
* @deprecated This method has unintuitive behaviour: it updates the `MatrixClient` instance with *some* of the
|
2018
|
+
* returned credentials. Instead, call {@link loginRequest} with `data.type: "m.login.password"`, and create a new
|
2019
|
+
* `MatrixClient` instance using the results. See https://github.com/matrix-org/matrix-js-sdk/issues/4502.
|
3261
2020
|
*/
|
3262
2021
|
loginWithPassword(user: string, password: string): Promise<LoginResponse>;
|
3263
2022
|
/**
|
@@ -3280,8 +2039,23 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
3280
2039
|
* @param token - Login token previously received from homeserver
|
3281
2040
|
* @returns Promise which resolves to a LoginResponse object
|
3282
2041
|
* @returns Rejects: with an error response.
|
2042
|
+
*
|
2043
|
+
* @deprecated This method has unintuitive behaviour: it updates the `MatrixClient` instance with *some* of the
|
2044
|
+
* returned credentials. Instead, call {@link loginRequest} with `data.type: "m.login.token"`, and create a new
|
2045
|
+
* `MatrixClient` instance using the results. See https://github.com/matrix-org/matrix-js-sdk/issues/4502.
|
3283
2046
|
*/
|
3284
2047
|
loginWithToken(token: string): Promise<LoginResponse>;
|
2048
|
+
/**
|
2049
|
+
* Sends a `POST /login` request to the server.
|
2050
|
+
*
|
2051
|
+
* If successful, this will create a new device and access token for the user.
|
2052
|
+
*
|
2053
|
+
* @see {@link MatrixClient.loginFlows} which makes a `GET /login` request.
|
2054
|
+
* @see https://spec.matrix.org/v1.13/client-server-api/#post_matrixclientv3login
|
2055
|
+
*
|
2056
|
+
* @param data - Credentials and other details for the login request.
|
2057
|
+
*/
|
2058
|
+
loginRequest(data: LoginRequest): Promise<LoginResponse>;
|
3285
2059
|
/**
|
3286
2060
|
* Logs out the current session.
|
3287
2061
|
* Obviously, further calls that require authorisation should fail after this
|
@@ -3794,47 +2568,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
3794
2568
|
body: ISearchRequestBody;
|
3795
2569
|
next_batch?: string;
|
3796
2570
|
}, abortSignal?: AbortSignal): Promise<ISearchResponse>;
|
3797
|
-
/**
|
3798
|
-
* Upload keys
|
3799
|
-
*
|
3800
|
-
* @param content - body of upload request
|
3801
|
-
*
|
3802
|
-
* @param opts - this method no longer takes any opts,
|
3803
|
-
* used to take opts.device_id but this was not removed from the spec as a redundant parameter
|
3804
|
-
*
|
3805
|
-
* @returns Promise which resolves: result object. Rejects: with
|
3806
|
-
* an error response ({@link MatrixError}).
|
3807
|
-
*/
|
3808
|
-
uploadKeysRequest(content: IUploadKeysRequest, opts?: void): Promise<IKeysUploadResponse>;
|
3809
|
-
uploadKeySignatures(content: KeySignatures): Promise<IUploadKeySignaturesResponse>;
|
3810
|
-
/**
|
3811
|
-
* Download device keys
|
3812
|
-
*
|
3813
|
-
* @param userIds - list of users to get keys for
|
3814
|
-
*
|
3815
|
-
* @param token - sync token to pass in the query request, to help
|
3816
|
-
* the HS give the most recent results
|
3817
|
-
*
|
3818
|
-
* @returns Promise which resolves: result object. Rejects: with
|
3819
|
-
* an error response ({@link MatrixError}).
|
3820
|
-
*/
|
3821
|
-
downloadKeysForUsers(userIds: string[], { token }?: {
|
3822
|
-
token?: string;
|
3823
|
-
}): Promise<IDownloadKeyResult>;
|
3824
|
-
/**
|
3825
|
-
* Claim one-time keys
|
3826
|
-
*
|
3827
|
-
* @param devices - a list of [userId, deviceId] pairs
|
3828
|
-
*
|
3829
|
-
* @param keyAlgorithm - desired key type
|
3830
|
-
*
|
3831
|
-
* @param timeout - the time (in milliseconds) to wait for keys from remote
|
3832
|
-
* servers
|
3833
|
-
*
|
3834
|
-
* @returns Promise which resolves: result object. Rejects: with
|
3835
|
-
* an error response ({@link MatrixError}).
|
3836
|
-
*/
|
3837
|
-
claimOneTimeKeys(devices: [string, string][], keyAlgorithm?: string, timeout?: number): Promise<IClaimOTKsResult>;
|
3838
2571
|
/**
|
3839
2572
|
* Ask the server for a list of users who have changed their device lists
|
3840
2573
|
* between a pair of sync tokens
|
@@ -3847,7 +2580,6 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
3847
2580
|
changed: string[];
|
3848
2581
|
left: string[];
|
3849
2582
|
}>;
|
3850
|
-
uploadDeviceSigningKeys(auth?: AuthDict, keys?: CrossSigningKeys): Promise<{}>;
|
3851
2583
|
/**
|
3852
2584
|
* Register with an identity server using the OpenID token from the user's
|
3853
2585
|
* Homeserver, which can be retrieved via
|
@@ -4193,17 +2925,24 @@ export declare class MatrixClient extends TypedEventEmitter<EmittedEvents, Clien
|
|
4193
2925
|
* @returns Resolves: A promise of an object containing the OIDC issuer if configured
|
4194
2926
|
* @returns Rejects: when the request fails (module:http-api.MatrixError)
|
4195
2927
|
* @experimental - part of MSC2965
|
2928
|
+
* @deprecated in favour of getAuthMetadata
|
4196
2929
|
*/
|
4197
2930
|
getAuthIssuer(): Promise<{
|
4198
2931
|
issuer: string;
|
4199
2932
|
}>;
|
2933
|
+
/**
|
2934
|
+
* Discover and validate delegated auth configuration
|
2935
|
+
* - delegated auth issuer openid-configuration is reachable
|
2936
|
+
* - delegated auth issuer openid-configuration is configured correctly for us
|
2937
|
+
* Fetches /auth_metadata falling back to legacy implementation using /auth_issuer followed by
|
2938
|
+
* https://oidc-issuer.example.com/.well-known/openid-configuration and other files linked therein.
|
2939
|
+
* When successful, validated metadata is returned
|
2940
|
+
* @returns validated authentication metadata and optionally signing keys
|
2941
|
+
* @throws when delegated auth config is invalid or unreachable
|
2942
|
+
* @experimental - part of MSC2965
|
2943
|
+
*/
|
2944
|
+
getAuthMetadata(): Promise<OidcClientConfig>;
|
4200
2945
|
}
|
4201
|
-
/**
|
4202
|
-
* recalculates an accurate notifications count on event decryption.
|
4203
|
-
* Servers do not have enough knowledge about encrypted events to calculate an
|
4204
|
-
* accurate notification_count
|
4205
|
-
*/
|
4206
|
-
export declare function fixNotificationCountOnDecryption(cli: MatrixClient, event: MatrixEvent): void;
|
4207
2946
|
/**
|
4208
2947
|
* Given an event, figure out the thread ID we should use for it in a receipt.
|
4209
2948
|
*
|