@unwanted/matrix-sdk-mini 34.12.0 → 36.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/git-revision.txt +1 -1
- package/lib/@types/event.d.ts +25 -19
- package/lib/@types/event.d.ts.map +1 -1
- package/lib/@types/event.js +5 -0
- package/lib/@types/event.js.map +1 -1
- package/lib/@types/global.d.js +0 -2
- package/lib/@types/global.d.js.map +1 -1
- package/lib/autodiscovery.d.ts +1 -1
- package/lib/autodiscovery.d.ts.map +1 -1
- package/lib/autodiscovery.js.map +1 -1
- package/lib/base64.d.ts +3 -6
- package/lib/base64.d.ts.map +1 -1
- package/lib/base64.js +43 -36
- package/lib/base64.js.map +1 -1
- package/lib/browser-index.d.ts.map +1 -1
- package/lib/browser-index.js +0 -11
- package/lib/browser-index.js.map +1 -1
- package/lib/client.d.ts +45 -1306
- package/lib/client.d.ts.map +1 -1
- package/lib/client.js +406 -2963
- package/lib/client.js.map +1 -1
- package/lib/digest.d.ts +2 -2
- package/lib/digest.d.ts.map +1 -1
- package/lib/digest.js +2 -2
- package/lib/digest.js.map +1 -1
- package/lib/embedded.d.ts +2 -23
- package/lib/embedded.d.ts.map +1 -1
- package/lib/embedded.js +82 -209
- package/lib/embedded.js.map +1 -1
- package/lib/event-mapper.d.ts.map +1 -1
- package/lib/event-mapper.js +0 -4
- package/lib/event-mapper.js.map +1 -1
- package/lib/feature.d.ts.map +1 -1
- package/lib/feature.js +2 -1
- package/lib/feature.js.map +1 -1
- package/lib/http-api/errors.d.ts +3 -3
- package/lib/http-api/errors.js +3 -3
- package/lib/http-api/errors.js.map +1 -1
- package/lib/http-api/utils.js +2 -2
- package/lib/http-api/utils.js.map +1 -1
- package/lib/matrix.d.ts +0 -25
- package/lib/matrix.d.ts.map +1 -1
- package/lib/matrix.js +1 -30
- package/lib/matrix.js.map +1 -1
- package/lib/models/MSC3089Branch.d.ts.map +1 -1
- package/lib/models/MSC3089Branch.js +0 -3
- package/lib/models/MSC3089Branch.js.map +1 -1
- package/lib/models/event-timeline-set.d.ts +6 -10
- package/lib/models/event-timeline-set.d.ts.map +1 -1
- package/lib/models/event-timeline-set.js +28 -36
- package/lib/models/event-timeline-set.js.map +1 -1
- package/lib/models/event-timeline.d.ts +7 -2
- package/lib/models/event-timeline.d.ts.map +1 -1
- package/lib/models/event-timeline.js +9 -30
- package/lib/models/event-timeline.js.map +1 -1
- package/lib/models/event.d.ts +12 -96
- package/lib/models/event.d.ts.map +1 -1
- package/lib/models/event.js +59 -286
- package/lib/models/event.js.map +1 -1
- package/lib/models/invites-ignorer-types.d.ts +27 -0
- package/lib/models/invites-ignorer-types.d.ts.map +1 -0
- package/lib/models/invites-ignorer-types.js +36 -0
- package/lib/models/invites-ignorer-types.js.map +1 -0
- package/lib/models/invites-ignorer.d.ts +2 -26
- package/lib/models/invites-ignorer.d.ts.map +1 -1
- package/lib/models/invites-ignorer.js +2 -27
- package/lib/models/invites-ignorer.js.map +1 -1
- package/lib/models/poll.d.ts.map +1 -1
- package/lib/models/poll.js +1 -5
- package/lib/models/poll.js.map +1 -1
- package/lib/models/relations-container.d.ts.map +1 -1
- package/lib/models/relations-container.js +1 -7
- package/lib/models/relations-container.js.map +1 -1
- package/lib/models/relations.d.ts +0 -1
- package/lib/models/relations.d.ts.map +1 -1
- package/lib/models/relations.js +0 -8
- package/lib/models/relations.js.map +1 -1
- package/lib/models/room-member.d.ts +6 -1
- package/lib/models/room-member.d.ts.map +1 -1
- package/lib/models/room-member.js +7 -1
- package/lib/models/room-member.js.map +1 -1
- package/lib/models/room-state.d.ts +2 -13
- package/lib/models/room-state.d.ts.map +1 -1
- package/lib/models/room-state.js +12 -56
- package/lib/models/room-state.js.map +1 -1
- package/lib/models/room.d.ts +8 -21
- package/lib/models/room.d.ts.map +1 -1
- package/lib/models/room.js +128 -163
- package/lib/models/room.js.map +1 -1
- package/lib/models/thread.d.ts.map +1 -1
- package/lib/models/thread.js +5 -4
- package/lib/models/thread.js.map +1 -1
- package/lib/oidc/authorize.d.ts +2 -2
- package/lib/oidc/authorize.d.ts.map +1 -1
- package/lib/oidc/authorize.js +5 -5
- package/lib/oidc/authorize.js.map +1 -1
- package/lib/oidc/discovery.d.ts +8 -0
- package/lib/oidc/discovery.d.ts.map +1 -1
- package/lib/oidc/discovery.js +22 -11
- package/lib/oidc/discovery.js.map +1 -1
- package/lib/oidc/index.d.ts +3 -4
- package/lib/oidc/index.d.ts.map +1 -1
- package/lib/oidc/index.js.map +1 -1
- package/lib/oidc/register.js +3 -3
- package/lib/oidc/register.js.map +1 -1
- package/lib/oidc/tokenRefresher.d.ts.map +1 -1
- package/lib/oidc/tokenRefresher.js +6 -5
- package/lib/oidc/tokenRefresher.js.map +1 -1
- package/lib/oidc/validate.d.ts +9 -23
- package/lib/oidc/validate.d.ts.map +1 -1
- package/lib/oidc/validate.js +13 -28
- package/lib/oidc/validate.js.map +1 -1
- package/lib/randomstring.d.ts +30 -3
- package/lib/randomstring.d.ts.map +1 -1
- package/lib/randomstring.js +68 -16
- package/lib/randomstring.js.map +1 -1
- package/lib/sliding-sync-sdk.d.ts +3 -4
- package/lib/sliding-sync-sdk.d.ts.map +1 -1
- package/lib/sliding-sync-sdk.js +55 -102
- package/lib/sliding-sync-sdk.js.map +1 -1
- package/lib/sliding-sync.js +9 -6
- package/lib/sliding-sync.js.map +1 -1
- package/lib/store/indexeddb-local-backend.js +4 -2
- package/lib/store/indexeddb-local-backend.js.map +1 -1
- package/lib/store/indexeddb.d.ts +1 -1
- package/lib/store/indexeddb.d.ts.map +1 -1
- package/lib/store/indexeddb.js.map +1 -1
- package/lib/sync-accumulator.d.ts +6 -4
- package/lib/sync-accumulator.d.ts.map +1 -1
- package/lib/sync-accumulator.js +23 -12
- package/lib/sync-accumulator.js.map +1 -1
- package/lib/sync.d.ts +10 -13
- package/lib/sync.d.ts.map +1 -1
- package/lib/sync.js +94 -115
- package/lib/sync.js.map +1 -1
- package/lib/testing.d.ts +13 -44
- package/lib/testing.d.ts.map +1 -1
- package/lib/testing.js +36 -99
- package/lib/testing.js.map +1 -1
- package/lib/types.d.ts +0 -1
- package/lib/types.d.ts.map +1 -1
- package/lib/types.js.map +1 -1
- package/package.json +14 -15
- package/src/@types/event.ts +19 -36
- package/src/@types/global.d.ts +21 -4
- package/src/autodiscovery.ts +1 -1
- package/src/base64.ts +38 -40
- package/src/browser-index.ts +0 -11
- package/src/client.ts +175 -3136
- package/src/digest.ts +3 -3
- package/src/embedded.ts +43 -149
- package/src/event-mapper.ts +0 -4
- package/src/feature.ts +1 -0
- package/src/http-api/errors.ts +3 -3
- package/src/http-api/utils.ts +2 -2
- package/src/matrix.ts +0 -41
- package/src/models/MSC3089Branch.ts +0 -3
- package/src/models/event-timeline-set.ts +17 -38
- package/src/models/event-timeline.ts +11 -26
- package/src/models/event.ts +54 -295
- package/src/models/invites-ignorer-types.ts +48 -0
- package/src/models/invites-ignorer.ts +7 -42
- package/src/models/poll.ts +0 -6
- package/src/models/relations-container.ts +1 -8
- package/src/models/relations.ts +0 -8
- package/src/models/room-member.ts +16 -1
- package/src/models/room-state.ts +4 -37
- package/src/models/room.ts +34 -69
- package/src/models/thread.ts +4 -3
- package/src/oidc/authorize.ts +7 -7
- package/src/oidc/discovery.ts +16 -10
- package/src/oidc/index.ts +3 -4
- package/src/oidc/register.ts +3 -3
- package/src/oidc/tokenRefresher.ts +3 -2
- package/src/oidc/validate.ts +40 -63
- package/src/randomstring.ts +65 -19
- package/src/sliding-sync-sdk.ts +10 -83
- package/src/sliding-sync.ts +6 -6
- package/src/store/indexeddb-local-backend.ts +2 -2
- package/src/store/indexeddb.ts +1 -1
- package/src/sync-accumulator.ts +33 -16
- package/src/sync.ts +112 -143
- package/src/testing.ts +36 -103
- package/src/types.ts +0 -1
- package/CHANGELOG.md +0 -5910
- package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
- package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
- package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
- package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
- package/lib/@types/crypto.d.ts +0 -47
- package/lib/@types/crypto.d.ts.map +0 -1
- package/lib/@types/crypto.js +0 -1
- package/lib/@types/crypto.js.map +0 -1
- package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
- package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
- package/lib/common-crypto/CryptoBackend.d.ts +0 -240
- package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
- package/lib/common-crypto/CryptoBackend.js +0 -73
- package/lib/common-crypto/CryptoBackend.js.map +0 -1
- package/lib/common-crypto/key-passphrase.d.ts +0 -14
- package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
- package/lib/common-crypto/key-passphrase.js +0 -33
- package/lib/common-crypto/key-passphrase.js.map +0 -1
- package/lib/crypto/CrossSigning.d.ts +0 -184
- package/lib/crypto/CrossSigning.d.ts.map +0 -1
- package/lib/crypto/CrossSigning.js +0 -718
- package/lib/crypto/CrossSigning.js.map +0 -1
- package/lib/crypto/DeviceList.d.ts +0 -216
- package/lib/crypto/DeviceList.d.ts.map +0 -1
- package/lib/crypto/DeviceList.js +0 -892
- package/lib/crypto/DeviceList.js.map +0 -1
- package/lib/crypto/EncryptionSetup.d.ts +0 -152
- package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
- package/lib/crypto/EncryptionSetup.js +0 -356
- package/lib/crypto/EncryptionSetup.js.map +0 -1
- package/lib/crypto/OlmDevice.d.ts +0 -457
- package/lib/crypto/OlmDevice.d.ts.map +0 -1
- package/lib/crypto/OlmDevice.js +0 -1241
- package/lib/crypto/OlmDevice.js.map +0 -1
- package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
- package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
- package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
- package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
- package/lib/crypto/RoomList.d.ts +0 -26
- package/lib/crypto/RoomList.d.ts.map +0 -1
- package/lib/crypto/RoomList.js +0 -71
- package/lib/crypto/RoomList.js.map +0 -1
- package/lib/crypto/SecretSharing.d.ts +0 -24
- package/lib/crypto/SecretSharing.d.ts.map +0 -1
- package/lib/crypto/SecretSharing.js +0 -194
- package/lib/crypto/SecretSharing.js.map +0 -1
- package/lib/crypto/SecretStorage.d.ts +0 -55
- package/lib/crypto/SecretStorage.d.ts.map +0 -1
- package/lib/crypto/SecretStorage.js +0 -118
- package/lib/crypto/SecretStorage.js.map +0 -1
- package/lib/crypto/aes.d.ts +0 -6
- package/lib/crypto/aes.d.ts.map +0 -1
- package/lib/crypto/aes.js +0 -24
- package/lib/crypto/aes.js.map +0 -1
- package/lib/crypto/algorithms/base.d.ts +0 -156
- package/lib/crypto/algorithms/base.d.ts.map +0 -1
- package/lib/crypto/algorithms/base.js +0 -187
- package/lib/crypto/algorithms/base.js.map +0 -1
- package/lib/crypto/algorithms/index.d.ts +0 -4
- package/lib/crypto/algorithms/index.d.ts.map +0 -1
- package/lib/crypto/algorithms/index.js +0 -20
- package/lib/crypto/algorithms/index.js.map +0 -1
- package/lib/crypto/algorithms/megolm.d.ts +0 -385
- package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
- package/lib/crypto/algorithms/megolm.js +0 -1822
- package/lib/crypto/algorithms/megolm.js.map +0 -1
- package/lib/crypto/algorithms/olm.d.ts +0 -5
- package/lib/crypto/algorithms/olm.d.ts.map +0 -1
- package/lib/crypto/algorithms/olm.js +0 -299
- package/lib/crypto/algorithms/olm.js.map +0 -1
- package/lib/crypto/api.d.ts +0 -32
- package/lib/crypto/api.d.ts.map +0 -1
- package/lib/crypto/api.js +0 -22
- package/lib/crypto/api.js.map +0 -1
- package/lib/crypto/backup.d.ts +0 -227
- package/lib/crypto/backup.d.ts.map +0 -1
- package/lib/crypto/backup.js +0 -824
- package/lib/crypto/backup.js.map +0 -1
- package/lib/crypto/crypto.d.ts +0 -3
- package/lib/crypto/crypto.d.ts.map +0 -1
- package/lib/crypto/crypto.js +0 -19
- package/lib/crypto/crypto.js.map +0 -1
- package/lib/crypto/dehydration.d.ts +0 -34
- package/lib/crypto/dehydration.d.ts.map +0 -1
- package/lib/crypto/dehydration.js +0 -252
- package/lib/crypto/dehydration.js.map +0 -1
- package/lib/crypto/device-converter.d.ts +0 -9
- package/lib/crypto/device-converter.d.ts.map +0 -1
- package/lib/crypto/device-converter.js +0 -42
- package/lib/crypto/device-converter.js.map +0 -1
- package/lib/crypto/deviceinfo.d.ts +0 -99
- package/lib/crypto/deviceinfo.d.ts.map +0 -1
- package/lib/crypto/deviceinfo.js +0 -148
- package/lib/crypto/deviceinfo.js.map +0 -1
- package/lib/crypto/index.d.ts +0 -1210
- package/lib/crypto/index.d.ts.map +0 -1
- package/lib/crypto/index.js +0 -4101
- package/lib/crypto/index.js.map +0 -1
- package/lib/crypto/key_passphrase.d.ts +0 -14
- package/lib/crypto/key_passphrase.d.ts.map +0 -1
- package/lib/crypto/key_passphrase.js +0 -44
- package/lib/crypto/key_passphrase.js.map +0 -1
- package/lib/crypto/keybackup.d.ts +0 -18
- package/lib/crypto/keybackup.d.ts.map +0 -1
- package/lib/crypto/keybackup.js +0 -1
- package/lib/crypto/keybackup.js.map +0 -1
- package/lib/crypto/olmlib.d.ts +0 -129
- package/lib/crypto/olmlib.d.ts.map +0 -1
- package/lib/crypto/olmlib.js +0 -492
- package/lib/crypto/olmlib.js.map +0 -1
- package/lib/crypto/recoverykey.d.ts +0 -2
- package/lib/crypto/recoverykey.d.ts.map +0 -1
- package/lib/crypto/recoverykey.js +0 -19
- package/lib/crypto/recoverykey.js.map +0 -1
- package/lib/crypto/store/base.d.ts +0 -252
- package/lib/crypto/store/base.d.ts.map +0 -1
- package/lib/crypto/store/base.js +0 -64
- package/lib/crypto/store/base.js.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
- package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
- package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
- package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
- package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
- package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
- package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/localStorage-crypto-store.js +0 -531
- package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
- package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
- package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
- package/lib/crypto/store/memory-crypto-store.js +0 -622
- package/lib/crypto/store/memory-crypto-store.js.map +0 -1
- package/lib/crypto/verification/Base.d.ts +0 -105
- package/lib/crypto/verification/Base.d.ts.map +0 -1
- package/lib/crypto/verification/Base.js +0 -372
- package/lib/crypto/verification/Base.js.map +0 -1
- package/lib/crypto/verification/Error.d.ts +0 -35
- package/lib/crypto/verification/Error.d.ts.map +0 -1
- package/lib/crypto/verification/Error.js +0 -86
- package/lib/crypto/verification/Error.js.map +0 -1
- package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
- package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
- package/lib/crypto/verification/IllegalMethod.js +0 -43
- package/lib/crypto/verification/IllegalMethod.js.map +0 -1
- package/lib/crypto/verification/QRCode.d.ts +0 -51
- package/lib/crypto/verification/QRCode.d.ts.map +0 -1
- package/lib/crypto/verification/QRCode.js +0 -277
- package/lib/crypto/verification/QRCode.js.map +0 -1
- package/lib/crypto/verification/SAS.d.ts +0 -27
- package/lib/crypto/verification/SAS.d.ts.map +0 -1
- package/lib/crypto/verification/SAS.js +0 -485
- package/lib/crypto/verification/SAS.js.map +0 -1
- package/lib/crypto/verification/SASDecimal.d.ts +0 -8
- package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
- package/lib/crypto/verification/SASDecimal.js +0 -34
- package/lib/crypto/verification/SASDecimal.js.map +0 -1
- package/lib/crypto/verification/request/Channel.d.ts +0 -18
- package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
- package/lib/crypto/verification/request/Channel.js +0 -1
- package/lib/crypto/verification/request/Channel.js.map +0 -1
- package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
- package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
- package/lib/crypto/verification/request/InRoomChannel.js +0 -351
- package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
- package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
- package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
- package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
- package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
- package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
- package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
- package/lib/crypto/verification/request/VerificationRequest.js +0 -937
- package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
- package/lib/crypto-api/CryptoEvent.d.ts +0 -69
- package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
- package/lib/crypto-api/CryptoEvent.js +0 -33
- package/lib/crypto-api/CryptoEvent.js.map +0 -1
- package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
- package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
- package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
- package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
- package/lib/crypto-api/index.d.ts +0 -978
- package/lib/crypto-api/index.d.ts.map +0 -1
- package/lib/crypto-api/index.js +0 -304
- package/lib/crypto-api/index.js.map +0 -1
- package/lib/crypto-api/key-passphrase.d.ts +0 -11
- package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
- package/lib/crypto-api/key-passphrase.js +0 -51
- package/lib/crypto-api/key-passphrase.js.map +0 -1
- package/lib/crypto-api/keybackup.d.ts +0 -88
- package/lib/crypto-api/keybackup.d.ts.map +0 -1
- package/lib/crypto-api/keybackup.js +0 -1
- package/lib/crypto-api/keybackup.js.map +0 -1
- package/lib/crypto-api/recovery-key.d.ts +0 -11
- package/lib/crypto-api/recovery-key.d.ts.map +0 -1
- package/lib/crypto-api/recovery-key.js +0 -65
- package/lib/crypto-api/recovery-key.js.map +0 -1
- package/lib/crypto-api/verification.d.ts +0 -344
- package/lib/crypto-api/verification.d.ts.map +0 -1
- package/lib/crypto-api/verification.js +0 -91
- package/lib/crypto-api/verification.js.map +0 -1
- package/lib/matrixrtc/CallMembership.d.ts +0 -66
- package/lib/matrixrtc/CallMembership.d.ts.map +0 -1
- package/lib/matrixrtc/CallMembership.js +0 -197
- package/lib/matrixrtc/CallMembership.js.map +0 -1
- package/lib/matrixrtc/LivekitFocus.d.ts +0 -16
- package/lib/matrixrtc/LivekitFocus.d.ts.map +0 -1
- package/lib/matrixrtc/LivekitFocus.js +0 -20
- package/lib/matrixrtc/LivekitFocus.js.map +0 -1
- package/lib/matrixrtc/MatrixRTCSession.d.ts +0 -295
- package/lib/matrixrtc/MatrixRTCSession.d.ts.map +0 -1
- package/lib/matrixrtc/MatrixRTCSession.js +0 -1043
- package/lib/matrixrtc/MatrixRTCSession.js.map +0 -1
- package/lib/matrixrtc/MatrixRTCSessionManager.d.ts +0 -40
- package/lib/matrixrtc/MatrixRTCSessionManager.d.ts.map +0 -1
- package/lib/matrixrtc/MatrixRTCSessionManager.js +0 -146
- package/lib/matrixrtc/MatrixRTCSessionManager.js.map +0 -1
- package/lib/matrixrtc/focus.d.ts +0 -10
- package/lib/matrixrtc/focus.d.ts.map +0 -1
- package/lib/matrixrtc/focus.js +0 -1
- package/lib/matrixrtc/focus.js.map +0 -1
- package/lib/matrixrtc/index.d.ts +0 -7
- package/lib/matrixrtc/index.d.ts.map +0 -1
- package/lib/matrixrtc/index.js +0 -21
- package/lib/matrixrtc/index.js.map +0 -1
- package/lib/matrixrtc/types.d.ts +0 -19
- package/lib/matrixrtc/types.d.ts.map +0 -1
- package/lib/matrixrtc/types.js +0 -1
- package/lib/matrixrtc/types.js.map +0 -1
- package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
- package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
- package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
- package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
- package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
- package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousChannel.js +0 -1
- package/lib/rendezvous/RendezvousChannel.js.map +0 -1
- package/lib/rendezvous/RendezvousCode.d.ts +0 -9
- package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousCode.js +0 -1
- package/lib/rendezvous/RendezvousCode.js.map +0 -1
- package/lib/rendezvous/RendezvousError.d.ts +0 -6
- package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousError.js +0 -23
- package/lib/rendezvous/RendezvousError.js.map +0 -1
- package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
- package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousFailureReason.js +0 -38
- package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
- package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
- package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousIntent.js +0 -22
- package/lib/rendezvous/RendezvousIntent.js.map +0 -1
- package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
- package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
- package/lib/rendezvous/RendezvousTransport.js +0 -1
- package/lib/rendezvous/RendezvousTransport.js.map +0 -1
- package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
- package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
- package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
- package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
- package/lib/rendezvous/channels/index.d.ts +0 -2
- package/lib/rendezvous/channels/index.d.ts.map +0 -1
- package/lib/rendezvous/channels/index.js +0 -18
- package/lib/rendezvous/channels/index.js.map +0 -1
- package/lib/rendezvous/index.d.ts +0 -10
- package/lib/rendezvous/index.d.ts.map +0 -1
- package/lib/rendezvous/index.js +0 -23
- package/lib/rendezvous/index.js.map +0 -1
- package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
- package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
- package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
- package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
- package/lib/rendezvous/transports/index.d.ts +0 -2
- package/lib/rendezvous/transports/index.d.ts.map +0 -1
- package/lib/rendezvous/transports/index.js +0 -18
- package/lib/rendezvous/transports/index.js.map +0 -1
- package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
- package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
- package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
- package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
- package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
- package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
- package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
- package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
- package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
- package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
- package/lib/rust-crypto/KeyClaimManager.js +0 -82
- package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
- package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
- package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
- package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
- package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
- package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
- package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
- package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
- package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
- package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
- package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
- package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
- package/lib/rust-crypto/RoomEncryptor.js +0 -299
- package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
- package/lib/rust-crypto/backup.d.ts +0 -254
- package/lib/rust-crypto/backup.d.ts.map +0 -1
- package/lib/rust-crypto/backup.js +0 -837
- package/lib/rust-crypto/backup.js.map +0 -1
- package/lib/rust-crypto/constants.d.ts +0 -3
- package/lib/rust-crypto/constants.d.ts.map +0 -1
- package/lib/rust-crypto/constants.js +0 -19
- package/lib/rust-crypto/constants.js.map +0 -1
- package/lib/rust-crypto/device-converter.d.ts +0 -28
- package/lib/rust-crypto/device-converter.d.ts.map +0 -1
- package/lib/rust-crypto/device-converter.js +0 -123
- package/lib/rust-crypto/device-converter.js.map +0 -1
- package/lib/rust-crypto/index.d.ts +0 -61
- package/lib/rust-crypto/index.d.ts.map +0 -1
- package/lib/rust-crypto/index.js +0 -152
- package/lib/rust-crypto/index.js.map +0 -1
- package/lib/rust-crypto/libolm_migration.d.ts +0 -81
- package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
- package/lib/rust-crypto/libolm_migration.js +0 -459
- package/lib/rust-crypto/libolm_migration.js.map +0 -1
- package/lib/rust-crypto/rust-crypto.d.ts +0 -556
- package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
- package/lib/rust-crypto/rust-crypto.js +0 -2016
- package/lib/rust-crypto/rust-crypto.js.map +0 -1
- package/lib/rust-crypto/secret-storage.d.ts +0 -22
- package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
- package/lib/rust-crypto/secret-storage.js +0 -63
- package/lib/rust-crypto/secret-storage.js.map +0 -1
- package/lib/rust-crypto/verification.d.ts +0 -319
- package/lib/rust-crypto/verification.d.ts.map +0 -1
- package/lib/rust-crypto/verification.js +0 -816
- package/lib/rust-crypto/verification.js.map +0 -1
- package/lib/secret-storage.d.ts +0 -370
- package/lib/secret-storage.d.ts.map +0 -1
- package/lib/secret-storage.js +0 -466
- package/lib/secret-storage.js.map +0 -1
- package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
- package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
- package/lib/utils/decryptAESSecretStorageItem.js +0 -50
- package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
- package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
- package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
- package/lib/utils/encryptAESSecretStorageItem.js +0 -68
- package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
- package/lib/utils/internal/deriveKeys.d.ts +0 -10
- package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
- package/lib/utils/internal/deriveKeys.js +0 -60
- package/lib/utils/internal/deriveKeys.js.map +0 -1
- package/lib/webrtc/audioContext.d.ts +0 -15
- package/lib/webrtc/audioContext.d.ts.map +0 -1
- package/lib/webrtc/audioContext.js +0 -46
- package/lib/webrtc/audioContext.js.map +0 -1
- package/lib/webrtc/call.d.ts +0 -560
- package/lib/webrtc/call.d.ts.map +0 -1
- package/lib/webrtc/call.js +0 -2541
- package/lib/webrtc/call.js.map +0 -1
- package/lib/webrtc/callEventHandler.d.ts +0 -37
- package/lib/webrtc/callEventHandler.d.ts.map +0 -1
- package/lib/webrtc/callEventHandler.js +0 -344
- package/lib/webrtc/callEventHandler.js.map +0 -1
- package/lib/webrtc/callEventTypes.d.ts +0 -73
- package/lib/webrtc/callEventTypes.d.ts.map +0 -1
- package/lib/webrtc/callEventTypes.js +0 -13
- package/lib/webrtc/callEventTypes.js.map +0 -1
- package/lib/webrtc/callFeed.d.ts +0 -128
- package/lib/webrtc/callFeed.d.ts.map +0 -1
- package/lib/webrtc/callFeed.js +0 -289
- package/lib/webrtc/callFeed.js.map +0 -1
- package/lib/webrtc/groupCall.d.ts +0 -323
- package/lib/webrtc/groupCall.d.ts.map +0 -1
- package/lib/webrtc/groupCall.js +0 -1337
- package/lib/webrtc/groupCall.js.map +0 -1
- package/lib/webrtc/groupCallEventHandler.d.ts +0 -31
- package/lib/webrtc/groupCallEventHandler.d.ts.map +0 -1
- package/lib/webrtc/groupCallEventHandler.js +0 -178
- package/lib/webrtc/groupCallEventHandler.js.map +0 -1
- package/lib/webrtc/mediaHandler.d.ts +0 -89
- package/lib/webrtc/mediaHandler.d.ts.map +0 -1
- package/lib/webrtc/mediaHandler.js +0 -437
- package/lib/webrtc/mediaHandler.js.map +0 -1
- package/lib/webrtc/stats/callFeedStatsReporter.d.ts +0 -8
- package/lib/webrtc/stats/callFeedStatsReporter.d.ts.map +0 -1
- package/lib/webrtc/stats/callFeedStatsReporter.js +0 -82
- package/lib/webrtc/stats/callFeedStatsReporter.js.map +0 -1
- package/lib/webrtc/stats/callStatsReportGatherer.d.ts +0 -25
- package/lib/webrtc/stats/callStatsReportGatherer.d.ts.map +0 -1
- package/lib/webrtc/stats/callStatsReportGatherer.js +0 -199
- package/lib/webrtc/stats/callStatsReportGatherer.js.map +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.d.ts +0 -17
- package/lib/webrtc/stats/callStatsReportSummary.d.ts.map +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.js +0 -1
- package/lib/webrtc/stats/callStatsReportSummary.js.map +0 -1
- package/lib/webrtc/stats/connectionStats.d.ts +0 -28
- package/lib/webrtc/stats/connectionStats.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStats.js +0 -26
- package/lib/webrtc/stats/connectionStats.js.map +0 -1
- package/lib/webrtc/stats/connectionStatsBuilder.d.ts +0 -5
- package/lib/webrtc/stats/connectionStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStatsBuilder.js +0 -27
- package/lib/webrtc/stats/connectionStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts +0 -7
- package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/connectionStatsReportBuilder.js +0 -121
- package/lib/webrtc/stats/connectionStatsReportBuilder.js.map +0 -1
- package/lib/webrtc/stats/groupCallStats.d.ts +0 -22
- package/lib/webrtc/stats/groupCallStats.d.ts.map +0 -1
- package/lib/webrtc/stats/groupCallStats.js +0 -78
- package/lib/webrtc/stats/groupCallStats.js.map +0 -1
- package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts +0 -10
- package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaSsrcHandler.js +0 -57
- package/lib/webrtc/stats/media/mediaSsrcHandler.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackHandler.d.ts +0 -12
- package/lib/webrtc/stats/media/mediaTrackHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackHandler.js +0 -62
- package/lib/webrtc/stats/media/mediaTrackHandler.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStats.d.ts +0 -86
- package/lib/webrtc/stats/media/mediaTrackStats.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStats.js +0 -142
- package/lib/webrtc/stats/media/mediaTrackStats.js.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts +0 -22
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts.map +0 -1
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.js +0 -76
- package/lib/webrtc/stats/media/mediaTrackStatsHandler.js.map +0 -1
- package/lib/webrtc/stats/statsReport.d.ts +0 -99
- package/lib/webrtc/stats/statsReport.d.ts.map +0 -1
- package/lib/webrtc/stats/statsReport.js +0 -32
- package/lib/webrtc/stats/statsReport.js.map +0 -1
- package/lib/webrtc/stats/statsReportEmitter.d.ts +0 -15
- package/lib/webrtc/stats/statsReportEmitter.d.ts.map +0 -1
- package/lib/webrtc/stats/statsReportEmitter.js +0 -33
- package/lib/webrtc/stats/statsReportEmitter.js.map +0 -1
- package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts +0 -16
- package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts.map +0 -1
- package/lib/webrtc/stats/summaryStatsReportGatherer.js +0 -116
- package/lib/webrtc/stats/summaryStatsReportGatherer.js.map +0 -1
- package/lib/webrtc/stats/trackStatsBuilder.d.ts +0 -19
- package/lib/webrtc/stats/trackStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/trackStatsBuilder.js +0 -168
- package/lib/webrtc/stats/trackStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/transportStats.d.ts +0 -11
- package/lib/webrtc/stats/transportStats.d.ts.map +0 -1
- package/lib/webrtc/stats/transportStats.js +0 -1
- package/lib/webrtc/stats/transportStats.js.map +0 -1
- package/lib/webrtc/stats/transportStatsBuilder.d.ts +0 -5
- package/lib/webrtc/stats/transportStatsBuilder.d.ts.map +0 -1
- package/lib/webrtc/stats/transportStatsBuilder.js +0 -34
- package/lib/webrtc/stats/transportStatsBuilder.js.map +0 -1
- package/lib/webrtc/stats/valueFormatter.d.ts +0 -4
- package/lib/webrtc/stats/valueFormatter.d.ts.map +0 -1
- package/lib/webrtc/stats/valueFormatter.js +0 -25
- package/lib/webrtc/stats/valueFormatter.js.map +0 -1
- package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
- package/src/@types/crypto.ts +0 -73
- package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
- package/src/common-crypto/CryptoBackend.ts +0 -302
- package/src/common-crypto/README.md +0 -4
- package/src/common-crypto/key-passphrase.ts +0 -43
- package/src/crypto/CrossSigning.ts +0 -773
- package/src/crypto/DeviceList.ts +0 -989
- package/src/crypto/EncryptionSetup.ts +0 -351
- package/src/crypto/OlmDevice.ts +0 -1500
- package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
- package/src/crypto/RoomList.ts +0 -70
- package/src/crypto/SecretSharing.ts +0 -240
- package/src/crypto/SecretStorage.ts +0 -136
- package/src/crypto/aes.ts +0 -23
- package/src/crypto/algorithms/base.ts +0 -236
- package/src/crypto/algorithms/index.ts +0 -20
- package/src/crypto/algorithms/megolm.ts +0 -2216
- package/src/crypto/algorithms/olm.ts +0 -381
- package/src/crypto/api.ts +0 -70
- package/src/crypto/backup.ts +0 -922
- package/src/crypto/crypto.ts +0 -18
- package/src/crypto/dehydration.ts +0 -272
- package/src/crypto/device-converter.ts +0 -45
- package/src/crypto/deviceinfo.ts +0 -158
- package/src/crypto/index.ts +0 -4418
- package/src/crypto/key_passphrase.ts +0 -42
- package/src/crypto/keybackup.ts +0 -47
- package/src/crypto/olmlib.ts +0 -539
- package/src/crypto/recoverykey.ts +0 -18
- package/src/crypto/store/base.ts +0 -348
- package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
- package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
- package/src/crypto/store/localStorage-crypto-store.ts +0 -579
- package/src/crypto/store/memory-crypto-store.ts +0 -680
- package/src/crypto/verification/Base.ts +0 -409
- package/src/crypto/verification/Error.ts +0 -76
- package/src/crypto/verification/IllegalMethod.ts +0 -50
- package/src/crypto/verification/QRCode.ts +0 -310
- package/src/crypto/verification/SAS.ts +0 -494
- package/src/crypto/verification/SASDecimal.ts +0 -37
- package/src/crypto/verification/request/Channel.ts +0 -34
- package/src/crypto/verification/request/InRoomChannel.ts +0 -371
- package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
- package/src/crypto/verification/request/VerificationRequest.ts +0 -976
- package/src/crypto-api/CryptoEvent.ts +0 -93
- package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
- package/src/crypto-api/index.ts +0 -1175
- package/src/crypto-api/key-passphrase.ts +0 -58
- package/src/crypto-api/keybackup.ts +0 -115
- package/src/crypto-api/recovery-key.ts +0 -69
- package/src/crypto-api/verification.ts +0 -408
- package/src/matrixrtc/CallMembership.ts +0 -247
- package/src/matrixrtc/LivekitFocus.ts +0 -39
- package/src/matrixrtc/MatrixRTCSession.ts +0 -1319
- package/src/matrixrtc/MatrixRTCSessionManager.ts +0 -166
- package/src/matrixrtc/focus.ts +0 -25
- package/src/matrixrtc/index.ts +0 -22
- package/src/matrixrtc/types.ts +0 -36
- package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
- package/src/rendezvous/RendezvousChannel.ts +0 -48
- package/src/rendezvous/RendezvousCode.ts +0 -25
- package/src/rendezvous/RendezvousError.ts +0 -26
- package/src/rendezvous/RendezvousFailureReason.ts +0 -49
- package/src/rendezvous/RendezvousIntent.ts +0 -20
- package/src/rendezvous/RendezvousTransport.ts +0 -58
- package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
- package/src/rendezvous/channels/index.ts +0 -17
- package/src/rendezvous/index.ts +0 -25
- package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
- package/src/rendezvous/transports/index.ts +0 -17
- package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
- package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
- package/src/rust-crypto/KeyClaimManager.ts +0 -86
- package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
- package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
- package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
- package/src/rust-crypto/RoomEncryptor.ts +0 -352
- package/src/rust-crypto/backup.ts +0 -881
- package/src/rust-crypto/constants.ts +0 -18
- package/src/rust-crypto/device-converter.ts +0 -128
- package/src/rust-crypto/index.ts +0 -237
- package/src/rust-crypto/libolm_migration.ts +0 -530
- package/src/rust-crypto/rust-crypto.ts +0 -2205
- package/src/rust-crypto/secret-storage.ts +0 -60
- package/src/rust-crypto/verification.ts +0 -830
- package/src/secret-storage.ts +0 -693
- package/src/utils/decryptAESSecretStorageItem.ts +0 -54
- package/src/utils/encryptAESSecretStorageItem.ts +0 -73
- package/src/utils/internal/deriveKeys.ts +0 -63
- package/src/webrtc/audioContext.ts +0 -44
- package/src/webrtc/call.ts +0 -3074
- package/src/webrtc/callEventHandler.ts +0 -425
- package/src/webrtc/callEventTypes.ts +0 -93
- package/src/webrtc/callFeed.ts +0 -364
- package/src/webrtc/groupCall.ts +0 -1735
- package/src/webrtc/groupCallEventHandler.ts +0 -234
- package/src/webrtc/mediaHandler.ts +0 -484
- package/src/webrtc/stats/callFeedStatsReporter.ts +0 -94
- package/src/webrtc/stats/callStatsReportGatherer.ts +0 -219
- package/src/webrtc/stats/callStatsReportSummary.ts +0 -30
- package/src/webrtc/stats/connectionStats.ts +0 -47
- package/src/webrtc/stats/connectionStatsBuilder.ts +0 -28
- package/src/webrtc/stats/connectionStatsReportBuilder.ts +0 -140
- package/src/webrtc/stats/groupCallStats.ts +0 -93
- package/src/webrtc/stats/media/mediaSsrcHandler.ts +0 -57
- package/src/webrtc/stats/media/mediaTrackHandler.ts +0 -76
- package/src/webrtc/stats/media/mediaTrackStats.ts +0 -176
- package/src/webrtc/stats/media/mediaTrackStatsHandler.ts +0 -90
- package/src/webrtc/stats/statsReport.ts +0 -133
- package/src/webrtc/stats/statsReportEmitter.ts +0 -49
- package/src/webrtc/stats/summaryStatsReportGatherer.ts +0 -148
- package/src/webrtc/stats/trackStatsBuilder.ts +0 -207
- package/src/webrtc/stats/transportStats.ts +0 -26
- package/src/webrtc/stats/transportStatsBuilder.ts +0 -48
- package/src/webrtc/stats/valueFormatter.ts +0 -27
package/lib/client.js
CHANGED
@@ -27,40 +27,29 @@ limitations under the License.
|
|
27
27
|
import { SyncApi, SyncState } from "./sync.js";
|
28
28
|
import { EventStatus, MatrixEvent, MatrixEventEvent } from "./models/event.js";
|
29
29
|
import { StubStore } from "./store/stub.js";
|
30
|
-
import { createNewMatrixCall, supportsMatrixCall } from "./webrtc/call.js";
|
31
30
|
import { Filter } from "./filter.js";
|
32
|
-
import { CallEventHandler } from "./webrtc/callEventHandler.js";
|
33
|
-
import { GroupCallEventHandler } from "./webrtc/groupCallEventHandler.js";
|
34
31
|
import * as utils from "./utils.js";
|
35
|
-
import { noUnsafeEventProps, replaceParam,
|
32
|
+
import { noUnsafeEventProps, replaceParam, sleep } from "./utils.js";
|
36
33
|
import { Direction, EventTimeline } from "./models/event-timeline.js";
|
37
34
|
import { PushProcessor } from "./pushprocessor.js";
|
38
35
|
import { AutoDiscovery } from "./autodiscovery.js";
|
39
|
-
import
|
40
|
-
import { decodeBase64, encodeBase64, encodeUnpaddedBase64Url } from "./base64.js";
|
36
|
+
import { encodeUnpaddedBase64Url } from "./base64.js";
|
41
37
|
import { TypedReEmitter } from "./ReEmitter.js";
|
42
38
|
import { logger } from "./logger.js";
|
43
39
|
import { SERVICE_TYPES } from "./service-types.js";
|
44
40
|
import { ClientPrefix, IdentityPrefix, MatrixError, MatrixHttpApi, MediaPrefix, Method, retryNetworkOperation } from "./http-api/index.js";
|
45
|
-
import { Crypto, CryptoEvent as LegacyCryptoEvent, fixBackupKey, isCryptoAvailable } from "./crypto/index.js";
|
46
41
|
import { User, UserEvent } from "./models/user.js";
|
47
42
|
import { getHttpUriForMxc } from "./content-repo.js";
|
48
43
|
import { SearchResult } from "./models/search-result.js";
|
49
|
-
import { DEHYDRATION_ALGORITHM } from "./crypto/dehydration.js";
|
50
|
-
import { CrossSigningKey } from "./crypto/api.js";
|
51
44
|
import * as ContentHelpers from "./content-helpers.js";
|
52
45
|
import { NotificationCountType } from "./models/room.js";
|
53
|
-
import { RoomMemberEvent } from "./models/room-member.js";
|
54
46
|
import { EventType, LOCAL_NOTIFICATION_SETTINGS_PREFIX, MSC3912_RELATION_BASED_REDACTIONS_PROP, MsgType, PUSHER_ENABLED, RelationType, RoomCreateTypeField, RoomType, UNSTABLE_MSC3088_ENABLED, UNSTABLE_MSC3088_PURPOSE, UNSTABLE_MSC3089_TREE_SUBTYPE } from "./@types/event.js";
|
55
47
|
import { GuestAccess, HistoryVisibility, Preset } from "./@types/partials.js";
|
56
48
|
import { eventMapperFor } from "./event-mapper.js";
|
57
|
-
import {
|
58
|
-
import { BackupManager } from "./crypto/backup.js";
|
49
|
+
import { secureRandomString } from "./randomstring.js";
|
59
50
|
import { DEFAULT_TREE_POWER_LEVELS_TEMPLATE, MSC3089TreeSpace } from "./models/MSC3089TreeSpace.js";
|
60
51
|
import { SearchOrderBy } from "./@types/search.js";
|
61
52
|
import { PushRuleActionName, PushRuleKind } from "./@types/PushRules.js";
|
62
|
-
import { GroupCall } from "./webrtc/groupCall.js";
|
63
|
-
import { MediaHandler } from "./webrtc/mediaHandler.js";
|
64
53
|
import { TypedEventEmitter } from "./models/typed-event-emitter.js";
|
65
54
|
import { MAIN_ROOM_TIMELINE, ReceiptType } from "./@types/read_receipts.js";
|
66
55
|
import { SlidingSyncSdk } from "./sliding-sync-sdk.js";
|
@@ -70,19 +59,12 @@ import { NamespacedValue, UnstableValue } from "./NamespacedValue.js";
|
|
70
59
|
import { ToDeviceMessageQueue } from "./ToDeviceMessageQueue.js";
|
71
60
|
import { IgnoredInvites } from "./models/invites-ignorer.js";
|
72
61
|
import { buildFeatureSupportMap, Feature, ServerSupport } from "./feature.js";
|
73
|
-
import { RUST_SDK_STORE_PREFIX } from "./rust-crypto/constants.js";
|
74
|
-
import { decodeRecoveryKey, CryptoEvent } from "./crypto-api/index.js";
|
75
|
-
import { ServerSideSecretStorageImpl } from "./secret-storage.js";
|
76
|
-
import { MatrixRTCSessionManager } from "./matrixrtc/MatrixRTCSessionManager.js";
|
77
62
|
import { getRelationsThreadFilter } from "./thread-utils.js";
|
78
63
|
import { KnownMembership } from "./@types/membership.js";
|
79
64
|
import { ServerCapabilities } from "./serverCapabilities.js";
|
80
65
|
import { sha256 } from "./digest.js";
|
81
|
-
import {
|
66
|
+
import { discoverAndValidateOIDCIssuerWellKnown, validateAuthMetadataAndKeys } from "./oidc/index.js";
|
82
67
|
var SCROLLBACK_DELAY_MS = 3000;
|
83
|
-
export var CRYPTO_ENABLED = isCryptoAvailable();
|
84
|
-
var TURN_CHECK_INTERVAL = 10 * 60 * 1000; // poll for turn credentials every 10 minutes
|
85
|
-
|
86
68
|
export var UNSTABLE_MSC3852_LAST_SEEN_UA = new UnstableValue("last_seen_user_agent", "org.matrix.msc3852.last_seen_user_agent");
|
87
69
|
export var PendingEventOrdering = /*#__PURE__*/function (PendingEventOrdering) {
|
88
70
|
PendingEventOrdering["Chronological"] = "chronological";
|
@@ -95,16 +77,14 @@ export var UNSTABLE_MSC2666_MUTUAL_ROOMS = "uk.half-shot.msc2666.mutual_rooms";
|
|
95
77
|
export var UNSTABLE_MSC2666_QUERY_MUTUAL_ROOMS = "uk.half-shot.msc2666.query_mutual_rooms";
|
96
78
|
export var UNSTABLE_MSC4140_DELAYED_EVENTS = "org.matrix.msc4140";
|
97
79
|
export var UNSTABLE_MSC4133_EXTENDED_PROFILES = "uk.tcpip.msc4133";
|
98
|
-
|
99
|
-
|
100
|
-
|
101
|
-
CrossSigningKeyType["UserSigningKey"] = "user_signing_key";
|
102
|
-
return CrossSigningKeyType;
|
103
|
-
}(CrossSigningKeyType || {}); // Re-export for backwards compatibility
|
80
|
+
|
81
|
+
// Re-export for backwards compatibility
|
82
|
+
|
104
83
|
/**
|
105
84
|
* The summary of a room as defined by an initial version of MSC3266 and implemented in Synapse
|
106
85
|
* Proposed at https://github.com/matrix-org/matrix-doc/pull/3266
|
107
86
|
*/
|
87
|
+
|
108
88
|
/* eslint-enable camelcase */
|
109
89
|
|
110
90
|
// We're using this constant for methods overloading and inspect whether a variable
|
@@ -136,7 +116,7 @@ var SSO_ACTION_PARAM = new UnstableValue("action", "org.matrix.msc3824.action");
|
|
136
116
|
*/
|
137
117
|
export class MatrixClient extends TypedEventEmitter {
|
138
118
|
constructor(opts) {
|
139
|
-
var _opts$logger, _opts$usingExternalCr, _this
|
119
|
+
var _opts$logger, _opts$usingExternalCr, _this;
|
140
120
|
// If a custom logger is provided, use it. Otherwise, default to the global
|
141
121
|
// one in logger.ts.
|
142
122
|
super();
|
@@ -149,16 +129,6 @@ export class MatrixClient extends TypedEventEmitter {
|
|
149
129
|
_defineProperty(this, "_store", void 0);
|
150
130
|
_defineProperty(this, "deviceId", void 0);
|
151
131
|
_defineProperty(this, "credentials", void 0);
|
152
|
-
/**
|
153
|
-
* Encryption key used for encrypting sensitive data (such as e2ee keys) in storage.
|
154
|
-
*
|
155
|
-
* As supplied in the constructor via {@link IMatrixClientCreateOpts#pickleKey}.
|
156
|
-
*
|
157
|
-
* If unset, either a hardcoded key or no encryption at all is used, depending on the Crypto implementation.
|
158
|
-
*
|
159
|
-
* @deprecated this should be a private property.
|
160
|
-
*/
|
161
|
-
_defineProperty(this, "pickleKey", void 0);
|
162
132
|
_defineProperty(this, "scheduler", void 0);
|
163
133
|
_defineProperty(this, "clientRunning", false);
|
164
134
|
_defineProperty(this, "timelineSupport", false);
|
@@ -166,25 +136,6 @@ export class MatrixClient extends TypedEventEmitter {
|
|
166
136
|
_defineProperty(this, "identityServer", void 0);
|
167
137
|
_defineProperty(this, "http", void 0);
|
168
138
|
// XXX: Intended private, used in code.
|
169
|
-
/**
|
170
|
-
* The libolm crypto implementation, if it is in use.
|
171
|
-
*
|
172
|
-
* @deprecated This should not be used. Instead, use the methods exposed directly on this class or
|
173
|
-
* (where they are available) via {@link getCrypto}.
|
174
|
-
*/
|
175
|
-
_defineProperty(this, "crypto", void 0);
|
176
|
-
// XXX: Intended private, used in code. Being replaced by cryptoBackend
|
177
|
-
_defineProperty(this, "cryptoBackend", void 0);
|
178
|
-
// one of crypto or rustCrypto
|
179
|
-
_defineProperty(this, "cryptoCallbacks", void 0);
|
180
|
-
// XXX: Intended private, used in code.
|
181
|
-
_defineProperty(this, "callEventHandler", void 0);
|
182
|
-
// XXX: Intended private, used in code.
|
183
|
-
_defineProperty(this, "groupCallEventHandler", void 0);
|
184
|
-
_defineProperty(this, "supportsCallTransfer", false);
|
185
|
-
// XXX: Intended private, used in code.
|
186
|
-
_defineProperty(this, "forceTURN", false);
|
187
|
-
// XXX: Intended private, used in code.
|
188
139
|
_defineProperty(this, "iceCandidatePoolSize", 0);
|
189
140
|
// XXX: Intended private, used in code.
|
190
141
|
_defineProperty(this, "idBaseUrl", void 0);
|
@@ -193,13 +144,11 @@ export class MatrixClient extends TypedEventEmitter {
|
|
193
144
|
_defineProperty(this, "useLivekitForGroupCalls", void 0);
|
194
145
|
// Note: these are all `protected` to let downstream consumers make mistakes if they want to.
|
195
146
|
// We don't technically support this usage, but have reasons to do this.
|
196
|
-
_defineProperty(this, "canSupportVoip", false);
|
197
147
|
_defineProperty(this, "peekSync", null);
|
198
148
|
_defineProperty(this, "isGuestAccount", false);
|
199
149
|
_defineProperty(this, "ongoingScrollbacks", {});
|
200
150
|
_defineProperty(this, "notifTimelineSet", null);
|
201
151
|
/* @deprecated */
|
202
|
-
_defineProperty(this, "cryptoStore", void 0);
|
203
152
|
_defineProperty(this, "verificationMethods", void 0);
|
204
153
|
_defineProperty(this, "fallbackICEServerAllowed", false);
|
205
154
|
_defineProperty(this, "syncApi", void 0);
|
@@ -218,12 +167,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
218
167
|
_defineProperty(this, "serverVersionsPromise", void 0);
|
219
168
|
_defineProperty(this, "clientWellKnown", void 0);
|
220
169
|
_defineProperty(this, "clientWellKnownPromise", void 0);
|
221
|
-
_defineProperty(this, "turnServers", []);
|
222
|
-
_defineProperty(this, "turnServersExpiry", 0);
|
223
|
-
_defineProperty(this, "checkTurnServersIntervalID", void 0);
|
224
|
-
_defineProperty(this, "exportedOlmDeviceToImport", void 0);
|
225
170
|
_defineProperty(this, "txnCtr", 0);
|
226
|
-
_defineProperty(this, "mediaHandler", new MediaHandler(this));
|
227
171
|
_defineProperty(this, "sessionId", void 0);
|
228
172
|
/** IDs of events which are currently being encrypted.
|
229
173
|
*
|
@@ -231,29 +175,11 @@ export class MatrixClient extends TypedEventEmitter {
|
|
231
175
|
* that tells us that it has been cancelled, and we should not send it.
|
232
176
|
*/
|
233
177
|
_defineProperty(this, "eventsBeingEncrypted", new Set());
|
234
|
-
_defineProperty(this, "useE2eForGroupCall", true);
|
235
178
|
_defineProperty(this, "toDeviceMessageQueue", void 0);
|
236
179
|
_defineProperty(this, "livekitServiceURL", void 0);
|
237
|
-
_defineProperty(this, "_secretStorage", void 0);
|
238
180
|
// A manager for determining which invites should be ignored.
|
239
181
|
_defineProperty(this, "ignoredInvites", void 0);
|
240
|
-
_defineProperty(this, "matrixRTC", void 0);
|
241
182
|
_defineProperty(this, "serverCapabilitiesService", void 0);
|
242
|
-
_defineProperty(this, "startCallEventHandler", () => {
|
243
|
-
if (this.isInitialSyncComplete()) {
|
244
|
-
if (supportsMatrixCall()) {
|
245
|
-
this.callEventHandler.start();
|
246
|
-
this.groupCallEventHandler.start();
|
247
|
-
}
|
248
|
-
this.off(ClientEvent.Sync, this.startCallEventHandler);
|
249
|
-
}
|
250
|
-
});
|
251
|
-
_defineProperty(this, "startMatrixRTC", () => {
|
252
|
-
if (this.isInitialSyncComplete()) {
|
253
|
-
this.matrixRTC.start();
|
254
|
-
this.off(ClientEvent.Sync, this.startMatrixRTC);
|
255
|
-
}
|
256
|
-
});
|
257
183
|
/**
|
258
184
|
* Once the client has been initialised, we want to clear notifications we
|
259
185
|
* know for a fact should be here.
|
@@ -286,7 +212,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
286
212
|
this.usingExternalCrypto = (_opts$usingExternalCr = opts.usingExternalCrypto) !== null && _opts$usingExternalCr !== void 0 ? _opts$usingExternalCr : false;
|
287
213
|
this.store = opts.store || new StubStore();
|
288
214
|
this.deviceId = opts.deviceId || null;
|
289
|
-
this.sessionId =
|
215
|
+
this.sessionId = secureRandomString(10);
|
290
216
|
var userId = opts.userId || null;
|
291
217
|
this.credentials = {
|
292
218
|
userId
|
@@ -315,11 +241,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
315
241
|
} else {
|
316
242
|
this.deviceId = opts.deviceToImport.deviceId;
|
317
243
|
this.credentials.userId = opts.deviceToImport.userId;
|
318
|
-
// will be used during async initialization of the crypto
|
319
|
-
this.exportedOlmDeviceToImport = opts.deviceToImport.olmDevice;
|
320
244
|
}
|
321
|
-
} else if (opts.pickleKey) {
|
322
|
-
this.pickleKey = opts.pickleKey;
|
323
245
|
}
|
324
246
|
this.useLivekitForGroupCalls = Boolean(opts.useLivekitForGroupCalls);
|
325
247
|
this.scheduler = opts.scheduler;
|
@@ -343,44 +265,17 @@ export class MatrixClient extends TypedEventEmitter {
|
|
343
265
|
};
|
344
266
|
}());
|
345
267
|
}
|
346
|
-
if (supportsMatrixCall()) {
|
347
|
-
this.callEventHandler = new CallEventHandler(this);
|
348
|
-
this.groupCallEventHandler = new GroupCallEventHandler(this);
|
349
|
-
this.canSupportVoip = true;
|
350
|
-
// Start listening for calls after the initial sync is done
|
351
|
-
// We do not need to backfill the call event buffer
|
352
|
-
// with encrypted events that might never get decrypted
|
353
|
-
this.on(ClientEvent.Sync, this.startCallEventHandler);
|
354
|
-
}
|
355
|
-
|
356
|
-
// NB. We initialise MatrixRTC whether we have call support or not: this is just
|
357
|
-
// the underlying session management and doesn't use any actual media capabilities
|
358
|
-
this.matrixRTC = new MatrixRTCSessionManager(this);
|
359
268
|
this.serverCapabilitiesService = new ServerCapabilities(this.http);
|
360
269
|
this.on(ClientEvent.Sync, this.fixupRoomNotifications);
|
361
270
|
this.timelineSupport = Boolean(opts.timelineSupport);
|
362
|
-
this.cryptoStore = opts.cryptoStore;
|
363
271
|
this.verificationMethods = opts.verificationMethods;
|
364
|
-
this.cryptoCallbacks = opts.cryptoCallbacks || {};
|
365
|
-
this.forceTURN = opts.forceTURN || false;
|
366
272
|
this.iceCandidatePoolSize = opts.iceCandidatePoolSize === undefined ? 0 : opts.iceCandidatePoolSize;
|
367
|
-
this.supportsCallTransfer = opts.supportsCallTransfer || false;
|
368
273
|
this.fallbackICEServerAllowed = opts.fallbackICEServerAllowed || false;
|
369
274
|
this.isVoipWithNoMediaAllowed = opts.isVoipWithNoMediaAllowed || false;
|
370
|
-
if (opts.useE2eForGroupCall !== undefined) this.useE2eForGroupCall = opts.useE2eForGroupCall;
|
371
275
|
this.livekitServiceURL = opts.livekitServiceURL;
|
372
276
|
this.roomNameGenerator = opts.roomNameGenerator;
|
373
277
|
this.toDeviceMessageQueue = new ToDeviceMessageQueue(this);
|
374
|
-
|
375
|
-
// The SDK doesn't really provide a clean way for events to recalculate the push
|
376
|
-
// actions for themselves, so we have to kinda help them out when they are encrypted.
|
377
|
-
// We do this so that push rules are correctly executed on events in their decrypted
|
378
|
-
// state, such as highlights when the user's name is mentioned.
|
379
|
-
this.on(MatrixEventEvent.Decrypted, event => {
|
380
|
-
fixNotificationCountOnDecryption(this, event);
|
381
|
-
});
|
382
278
|
this.ignoredInvites = new IgnoredInvites(this);
|
383
|
-
this._secretStorage = new ServerSideSecretStorageImpl(this, (_opts$cryptoCallbacks = opts.cryptoCallbacks) !== null && _opts$cryptoCallbacks !== void 0 ? _opts$cryptoCallbacks : {});
|
384
279
|
|
385
280
|
// having lots of event listeners is not unusual. 0 means "unlimited".
|
386
281
|
this.setMaxListeners(0);
|
@@ -408,7 +303,6 @@ export class MatrixClient extends TypedEventEmitter {
|
|
408
303
|
return;
|
409
304
|
}
|
410
305
|
_this2.clientRunning = true;
|
411
|
-
_this2.on(ClientEvent.Sync, _this2.startMatrixRTC);
|
412
306
|
|
413
307
|
// Create our own user object artificially (instead of waiting for sync)
|
414
308
|
// so it's always available, even if the user is not in any rooms etc.
|
@@ -416,15 +310,6 @@ export class MatrixClient extends TypedEventEmitter {
|
|
416
310
|
if (userId) {
|
417
311
|
_this2.store.storeUser(new User(userId));
|
418
312
|
}
|
419
|
-
|
420
|
-
// periodically poll for turn servers if we support voip
|
421
|
-
if (_this2.canSupportVoip) {
|
422
|
-
_this2.checkTurnServersIntervalID = setInterval(() => {
|
423
|
-
_this2.checkTurnServers();
|
424
|
-
}, TURN_CHECK_INTERVAL);
|
425
|
-
// noinspection ES6MissingAwait
|
426
|
-
_this2.checkTurnServers();
|
427
|
-
}
|
428
313
|
if (_this2.syncApi) {
|
429
314
|
// This shouldn't happen since we thought the client was not running
|
430
315
|
_this2.logger.error("Still have sync object whilst not running: stopping old one");
|
@@ -448,7 +333,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
448
333
|
}
|
449
334
|
_this2.clientOpts = opts !== null && opts !== void 0 ? opts : {};
|
450
335
|
if (_this2.clientOpts.slidingSync) {
|
451
|
-
_this2.syncApi = new SlidingSyncSdk(_this2.clientOpts.slidingSync, _this2, _this2.clientOpts
|
336
|
+
_this2.syncApi = new SlidingSyncSdk(_this2.clientOpts.slidingSync, _this2, _this2.clientOpts);
|
452
337
|
} else {
|
453
338
|
_this2.syncApi = new SyncApi(_this2, _this2.clientOpts, _this2.buildSyncApiOptions());
|
454
339
|
}
|
@@ -469,8 +354,6 @@ export class MatrixClient extends TypedEventEmitter {
|
|
469
354
|
*/
|
470
355
|
buildSyncApiOptions() {
|
471
356
|
return {
|
472
|
-
crypto: this.crypto,
|
473
|
-
cryptoCallbacks: this.cryptoBackend,
|
474
357
|
canResetEntireTimeline: roomId => {
|
475
358
|
if (!this.canResetTimelineCallback) {
|
476
359
|
return false;
|
@@ -485,10 +368,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
485
368
|
* clean shutdown.
|
486
369
|
*/
|
487
370
|
stopClient() {
|
488
|
-
var _this$
|
489
|
-
(_this$cryptoBackend = this.cryptoBackend) === null || _this$cryptoBackend === void 0 || _this$cryptoBackend.stop(); // crypto might have been initialised even if the client wasn't fully started
|
490
|
-
|
491
|
-
this.off(ClientEvent.Sync, this.startMatrixRTC);
|
371
|
+
var _this$syncApi, _this$peekSync;
|
492
372
|
if (!this.clientRunning) return; // already stopped
|
493
373
|
|
494
374
|
this.logger.debug("stopping MatrixClient");
|
@@ -496,233 +376,24 @@ export class MatrixClient extends TypedEventEmitter {
|
|
496
376
|
(_this$syncApi = this.syncApi) === null || _this$syncApi === void 0 || _this$syncApi.stop();
|
497
377
|
this.syncApi = undefined;
|
498
378
|
(_this$peekSync = this.peekSync) === null || _this$peekSync === void 0 || _this$peekSync.stopPeeking();
|
499
|
-
(_this$callEventHandle = this.callEventHandler) === null || _this$callEventHandle === void 0 || _this$callEventHandle.stop();
|
500
|
-
(_this$groupCallEventH = this.groupCallEventHandler) === null || _this$groupCallEventH === void 0 || _this$groupCallEventH.stop();
|
501
|
-
this.callEventHandler = undefined;
|
502
|
-
this.groupCallEventHandler = undefined;
|
503
|
-
globalThis.clearInterval(this.checkTurnServersIntervalID);
|
504
|
-
this.checkTurnServersIntervalID = undefined;
|
505
379
|
if (this.clientWellKnownIntervalID !== undefined) {
|
506
380
|
globalThis.clearInterval(this.clientWellKnownIntervalID);
|
507
381
|
}
|
508
382
|
this.toDeviceMessageQueue.stop();
|
509
|
-
this.matrixRTC.stop();
|
510
383
|
this.serverCapabilitiesService.stop();
|
511
384
|
}
|
512
385
|
|
513
|
-
/**
|
514
|
-
* Try to rehydrate a device if available. The client must have been
|
515
|
-
* initialized with a `cryptoCallback.getDehydrationKey` option, and this
|
516
|
-
* function must be called before initCrypto and startClient are called.
|
517
|
-
*
|
518
|
-
* @returns Promise which resolves to undefined if a device could not be dehydrated, or
|
519
|
-
* to the new device ID if the dehydration was successful.
|
520
|
-
* @returns Rejects: with an error response.
|
521
|
-
*
|
522
|
-
* @deprecated MSC2697 device dehydration is not supported for rust cryptography.
|
523
|
-
*/
|
524
|
-
rehydrateDevice() {
|
525
|
-
var _this3 = this;
|
526
|
-
return _asyncToGenerator(function* () {
|
527
|
-
if (_this3.crypto) {
|
528
|
-
throw new Error("Cannot rehydrate device after crypto is initialized");
|
529
|
-
}
|
530
|
-
if (!_this3.cryptoCallbacks.getDehydrationKey) {
|
531
|
-
return;
|
532
|
-
}
|
533
|
-
var getDeviceResult = yield _this3.getDehydratedDevice();
|
534
|
-
if (!getDeviceResult) {
|
535
|
-
return;
|
536
|
-
}
|
537
|
-
if (!getDeviceResult.device_data || !getDeviceResult.device_id) {
|
538
|
-
_this3.logger.info("no dehydrated device found");
|
539
|
-
return;
|
540
|
-
}
|
541
|
-
var account = new globalThis.Olm.Account();
|
542
|
-
try {
|
543
|
-
var deviceData = getDeviceResult.device_data;
|
544
|
-
if (deviceData.algorithm !== DEHYDRATION_ALGORITHM) {
|
545
|
-
_this3.logger.warn("Wrong algorithm for dehydrated device");
|
546
|
-
return;
|
547
|
-
}
|
548
|
-
_this3.logger.debug("unpickling dehydrated device");
|
549
|
-
var _key = yield _this3.cryptoCallbacks.getDehydrationKey(deviceData, k => {
|
550
|
-
// copy the key so that it doesn't get clobbered
|
551
|
-
account.unpickle(new Uint8Array(k), deviceData.account);
|
552
|
-
});
|
553
|
-
account.unpickle(_key, deviceData.account);
|
554
|
-
_this3.logger.debug("unpickled device");
|
555
|
-
var rehydrateResult = yield _this3.http.authedRequest(Method.Post, "/dehydrated_device/claim", undefined, {
|
556
|
-
device_id: getDeviceResult.device_id
|
557
|
-
}, {
|
558
|
-
prefix: "/_matrix/client/unstable/org.matrix.msc2697.v2"
|
559
|
-
});
|
560
|
-
if (rehydrateResult.success) {
|
561
|
-
_this3.deviceId = getDeviceResult.device_id;
|
562
|
-
_this3.logger.info("using dehydrated device");
|
563
|
-
var pickleKey = _this3.pickleKey || "DEFAULT_KEY";
|
564
|
-
_this3.exportedOlmDeviceToImport = {
|
565
|
-
pickledAccount: account.pickle(pickleKey),
|
566
|
-
sessions: [],
|
567
|
-
pickleKey: pickleKey
|
568
|
-
};
|
569
|
-
account.free();
|
570
|
-
return _this3.deviceId;
|
571
|
-
} else {
|
572
|
-
account.free();
|
573
|
-
_this3.logger.info("not using dehydrated device");
|
574
|
-
return;
|
575
|
-
}
|
576
|
-
} catch (e) {
|
577
|
-
account.free();
|
578
|
-
_this3.logger.warn("could not unpickle", e);
|
579
|
-
}
|
580
|
-
})();
|
581
|
-
}
|
582
|
-
|
583
|
-
/**
|
584
|
-
* Get the current dehydrated device, if any
|
585
|
-
* @returns A promise of an object containing the dehydrated device
|
586
|
-
*
|
587
|
-
* @deprecated MSC2697 device dehydration is not supported for rust cryptography.
|
588
|
-
*/
|
589
|
-
getDehydratedDevice() {
|
590
|
-
var _this4 = this;
|
591
|
-
return _asyncToGenerator(function* () {
|
592
|
-
try {
|
593
|
-
return yield _this4.http.authedRequest(Method.Get, "/dehydrated_device", undefined, undefined, {
|
594
|
-
prefix: "/_matrix/client/unstable/org.matrix.msc2697.v2"
|
595
|
-
});
|
596
|
-
} catch (e) {
|
597
|
-
_this4.logger.info("could not get dehydrated device", e);
|
598
|
-
return;
|
599
|
-
}
|
600
|
-
})();
|
601
|
-
}
|
602
|
-
|
603
|
-
/**
|
604
|
-
* Set the dehydration key. This will also periodically dehydrate devices to
|
605
|
-
* the server.
|
606
|
-
*
|
607
|
-
* @param key - the dehydration key
|
608
|
-
* @param keyInfo - Information about the key. Primarily for
|
609
|
-
* information about how to generate the key from a passphrase.
|
610
|
-
* @param deviceDisplayName - The device display name for the
|
611
|
-
* dehydrated device.
|
612
|
-
* @returns A promise that resolves when the dehydrated device is stored.
|
613
|
-
*
|
614
|
-
* @deprecated Not supported for Rust Cryptography.
|
615
|
-
*/
|
616
|
-
setDehydrationKey(key, keyInfo, deviceDisplayName) {
|
617
|
-
var _this5 = this;
|
618
|
-
return _asyncToGenerator(function* () {
|
619
|
-
if (!_this5.crypto) {
|
620
|
-
_this5.logger.warn("not dehydrating device if crypto is not enabled");
|
621
|
-
return;
|
622
|
-
}
|
623
|
-
return _this5.crypto.dehydrationManager.setKeyAndQueueDehydration(key, keyInfo, deviceDisplayName);
|
624
|
-
})();
|
625
|
-
}
|
626
|
-
|
627
|
-
/**
|
628
|
-
* Creates a new MSC2967 dehydrated device (without queuing periodic dehydration)
|
629
|
-
* @param key - the dehydration key
|
630
|
-
* @param keyInfo - Information about the key. Primarily for
|
631
|
-
* information about how to generate the key from a passphrase.
|
632
|
-
* @param deviceDisplayName - The device display name for the
|
633
|
-
* dehydrated device.
|
634
|
-
* @returns the device id of the newly created dehydrated device
|
635
|
-
*
|
636
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.startDehydration}.
|
637
|
-
*/
|
638
|
-
createDehydratedDevice(key, keyInfo, deviceDisplayName) {
|
639
|
-
var _this6 = this;
|
640
|
-
return _asyncToGenerator(function* () {
|
641
|
-
if (!_this6.crypto) {
|
642
|
-
_this6.logger.warn("not dehydrating device if crypto is not enabled");
|
643
|
-
return;
|
644
|
-
}
|
645
|
-
yield _this6.crypto.dehydrationManager.setKey(key, keyInfo, deviceDisplayName);
|
646
|
-
return _this6.crypto.dehydrationManager.dehydrateDevice();
|
647
|
-
})();
|
648
|
-
}
|
649
|
-
|
650
|
-
/** @deprecated Not supported for Rust Cryptography. */
|
651
|
-
exportDevice() {
|
652
|
-
var _this7 = this;
|
653
|
-
return _asyncToGenerator(function* () {
|
654
|
-
if (!_this7.crypto) {
|
655
|
-
_this7.logger.warn("not exporting device if crypto is not enabled");
|
656
|
-
return;
|
657
|
-
}
|
658
|
-
return {
|
659
|
-
userId: _this7.credentials.userId,
|
660
|
-
deviceId: _this7.deviceId,
|
661
|
-
// XXX: Private member access.
|
662
|
-
olmDevice: yield _this7.crypto.olmDevice.export()
|
663
|
-
};
|
664
|
-
})();
|
665
|
-
}
|
666
|
-
|
667
386
|
/**
|
668
387
|
* Clear any data out of the persistent stores used by the client.
|
669
388
|
*
|
670
389
|
* @returns Promise which resolves when the stores have been cleared.
|
671
390
|
*/
|
672
391
|
clearStores() {
|
673
|
-
var _this8 = this;
|
674
392
|
if (this.clientRunning) {
|
675
393
|
throw new Error("Cannot clear stores while client is running");
|
676
394
|
}
|
677
395
|
var promises = [];
|
678
396
|
promises.push(this.store.deleteAllData());
|
679
|
-
if (this.cryptoStore) {
|
680
|
-
promises.push(this.cryptoStore.deleteAllData());
|
681
|
-
}
|
682
|
-
|
683
|
-
// delete the stores used by the rust matrix-sdk-crypto, in case they were used
|
684
|
-
var deleteRustSdkStore = /*#__PURE__*/function () {
|
685
|
-
var _ref2 = _asyncToGenerator(function* () {
|
686
|
-
var indexedDB;
|
687
|
-
try {
|
688
|
-
indexedDB = globalThis.indexedDB;
|
689
|
-
if (!indexedDB) return; // No indexedDB support
|
690
|
-
} catch (_unused) {
|
691
|
-
// No indexedDB support
|
692
|
-
return;
|
693
|
-
}
|
694
|
-
var _loop = function* _loop(dbname) {
|
695
|
-
var prom = new Promise((resolve, reject) => {
|
696
|
-
_this8.logger.info("Removing IndexedDB instance ".concat(dbname));
|
697
|
-
var req = indexedDB.deleteDatabase(dbname);
|
698
|
-
req.onsuccess = _ => {
|
699
|
-
_this8.logger.info("Removed IndexedDB instance ".concat(dbname));
|
700
|
-
resolve(0);
|
701
|
-
};
|
702
|
-
req.onerror = e => {
|
703
|
-
// In private browsing, Firefox has a globalThis.indexedDB, but attempts to delete an indexeddb
|
704
|
-
// (even a non-existent one) fail with "DOMException: A mutation operation was attempted on a
|
705
|
-
// database that did not allow mutations."
|
706
|
-
//
|
707
|
-
// it seems like the only thing we can really do is ignore the error.
|
708
|
-
_this8.logger.warn("Failed to remove IndexedDB instance ".concat(dbname, ":"), e);
|
709
|
-
resolve(0);
|
710
|
-
};
|
711
|
-
req.onblocked = e => {
|
712
|
-
_this8.logger.info("cannot yet remove IndexedDB instance ".concat(dbname));
|
713
|
-
};
|
714
|
-
});
|
715
|
-
yield prom;
|
716
|
-
};
|
717
|
-
for (var dbname of ["".concat(RUST_SDK_STORE_PREFIX, "::matrix-sdk-crypto"), "".concat(RUST_SDK_STORE_PREFIX, "::matrix-sdk-crypto-meta")]) {
|
718
|
-
yield* _loop(dbname);
|
719
|
-
}
|
720
|
-
});
|
721
|
-
return function deleteRustSdkStore() {
|
722
|
-
return _ref2.apply(this, arguments);
|
723
|
-
};
|
724
|
-
}();
|
725
|
-
promises.push(deleteRustSdkStore());
|
726
397
|
return Promise.all(promises).then(); // .then to fix types
|
727
398
|
}
|
728
399
|
|
@@ -732,10 +403,8 @@ export class MatrixClient extends TypedEventEmitter {
|
|
732
403
|
* @returns MXID for the logged-in user, or null if not logged in
|
733
404
|
*/
|
734
405
|
getUserId() {
|
735
|
-
|
736
|
-
|
737
|
-
}
|
738
|
-
return null;
|
406
|
+
var _this$credentials$use, _this$credentials;
|
407
|
+
return (_this$credentials$use = (_this$credentials = this.credentials) === null || _this$credentials === void 0 ? void 0 : _this$credentials.userId) !== null && _this$credentials$use !== void 0 ? _this$credentials$use : null;
|
739
408
|
}
|
740
409
|
|
741
410
|
/**
|
@@ -757,7 +426,8 @@ export class MatrixClient extends TypedEventEmitter {
|
|
757
426
|
* @returns Domain of this MXID
|
758
427
|
*/
|
759
428
|
getDomain() {
|
760
|
-
|
429
|
+
var _this$credentials2;
|
430
|
+
if ((_this$credentials2 = this.credentials) !== null && _this$credentials2 !== void 0 && _this$credentials2.userId) {
|
761
431
|
return this.credentials.userId.replace(/^.*?:/, "");
|
762
432
|
}
|
763
433
|
return null;
|
@@ -768,10 +438,8 @@ export class MatrixClient extends TypedEventEmitter {
|
|
768
438
|
* @returns The user ID localpart or null.
|
769
439
|
*/
|
770
440
|
getUserIdLocalpart() {
|
771
|
-
|
772
|
-
|
773
|
-
}
|
774
|
-
return null;
|
441
|
+
var _this$credentials$use2, _this$credentials3;
|
442
|
+
return (_this$credentials$use2 = (_this$credentials3 = this.credentials) === null || _this$credentials3 === void 0 || (_this$credentials3 = _this$credentials3.userId) === null || _this$credentials3 === void 0 ? void 0 : _this$credentials3.split(":")[0].substring(1)) !== null && _this$credentials$use2 !== void 0 ? _this$credentials$use2 : null;
|
775
443
|
}
|
776
444
|
|
777
445
|
/**
|
@@ -789,82 +457,6 @@ export class MatrixClient extends TypedEventEmitter {
|
|
789
457
|
getSessionId() {
|
790
458
|
return this.sessionId;
|
791
459
|
}
|
792
|
-
|
793
|
-
/**
|
794
|
-
* Check if the runtime environment supports VoIP calling.
|
795
|
-
* @returns True if VoIP is supported.
|
796
|
-
*/
|
797
|
-
supportsVoip() {
|
798
|
-
return this.canSupportVoip;
|
799
|
-
}
|
800
|
-
|
801
|
-
/**
|
802
|
-
* @returns
|
803
|
-
*/
|
804
|
-
getMediaHandler() {
|
805
|
-
return this.mediaHandler;
|
806
|
-
}
|
807
|
-
|
808
|
-
/**
|
809
|
-
* Set whether VoIP calls are forced to use only TURN
|
810
|
-
* candidates. This is the same as the forceTURN option
|
811
|
-
* when creating the client.
|
812
|
-
* @param force - True to force use of TURN servers
|
813
|
-
*/
|
814
|
-
setForceTURN(force) {
|
815
|
-
this.forceTURN = force;
|
816
|
-
}
|
817
|
-
|
818
|
-
/**
|
819
|
-
* Set whether to advertise transfer support to other parties on Matrix calls.
|
820
|
-
* @param support - True to advertise the 'm.call.transferee' capability
|
821
|
-
*/
|
822
|
-
setSupportsCallTransfer(support) {
|
823
|
-
this.supportsCallTransfer = support;
|
824
|
-
}
|
825
|
-
|
826
|
-
/**
|
827
|
-
* Returns true if to-device signalling for group calls will be encrypted with Olm.
|
828
|
-
* If false, it will be sent unencrypted.
|
829
|
-
* @returns boolean Whether group call signalling will be encrypted
|
830
|
-
*/
|
831
|
-
getUseE2eForGroupCall() {
|
832
|
-
return this.useE2eForGroupCall;
|
833
|
-
}
|
834
|
-
|
835
|
-
/**
|
836
|
-
* Creates a new call.
|
837
|
-
* The place*Call methods on the returned call can be used to actually place a call
|
838
|
-
*
|
839
|
-
* @param roomId - The room the call is to be placed in.
|
840
|
-
* @returns the call or null if the browser doesn't support calling.
|
841
|
-
*/
|
842
|
-
createCall(roomId) {
|
843
|
-
return createNewMatrixCall(this, roomId);
|
844
|
-
}
|
845
|
-
|
846
|
-
/**
|
847
|
-
* Creates a new group call and sends the associated state event
|
848
|
-
* to alert other members that the room now has a group call.
|
849
|
-
*
|
850
|
-
* @param roomId - The room the call is to be placed in.
|
851
|
-
*/
|
852
|
-
createGroupCall(roomId, type, isPtt, intent, dataChannelsEnabled, dataChannelOptions) {
|
853
|
-
var _this9 = this;
|
854
|
-
return _asyncToGenerator(function* () {
|
855
|
-
if (_this9.getGroupCallForRoom(roomId)) {
|
856
|
-
throw new Error("".concat(roomId, " already has an existing group call"));
|
857
|
-
}
|
858
|
-
var room = _this9.getRoom(roomId);
|
859
|
-
if (!room) {
|
860
|
-
throw new Error("Cannot find room ".concat(roomId));
|
861
|
-
}
|
862
|
-
|
863
|
-
// Because without Media section a WebRTC connection is not possible, so need a RTCDataChannel to set up a
|
864
|
-
// no media WebRTC connection anyway.
|
865
|
-
return new GroupCall(_this9, room, type, isPtt, intent, undefined, dataChannelsEnabled || _this9.isVoipWithNoMediaAllowed, dataChannelOptions, _this9.isVoipWithNoMediaAllowed, _this9.useLivekitForGroupCalls, _this9.livekitServiceURL).create();
|
866
|
-
})();
|
867
|
-
}
|
868
460
|
getLivekitServiceURL() {
|
869
461
|
return this.livekitServiceURL;
|
870
462
|
}
|
@@ -875,29 +467,6 @@ export class MatrixClient extends TypedEventEmitter {
|
|
875
467
|
this.livekitServiceURL = newURL;
|
876
468
|
}
|
877
469
|
|
878
|
-
/**
|
879
|
-
* Wait until an initial state for the given room has been processed by the
|
880
|
-
* client and the client is aware of any ongoing group calls. Awaiting on
|
881
|
-
* the promise returned by this method before calling getGroupCallForRoom()
|
882
|
-
* avoids races where getGroupCallForRoom is called before the state for that
|
883
|
-
* room has been processed. It does not, however, fix other races, eg. two
|
884
|
-
* clients both creating a group call at the same time.
|
885
|
-
* @param roomId - The room ID to wait for
|
886
|
-
* @returns A promise that resolves once existing group calls in the room
|
887
|
-
* have been processed.
|
888
|
-
*/
|
889
|
-
waitUntilRoomReadyForGroupCalls(roomId) {
|
890
|
-
return this.groupCallEventHandler.waitUntilRoomReadyForGroupCalls(roomId);
|
891
|
-
}
|
892
|
-
|
893
|
-
/**
|
894
|
-
* Get an existing group call for the provided room.
|
895
|
-
* @returns The group call or null if it doesn't already exist.
|
896
|
-
*/
|
897
|
-
getGroupCallForRoom(roomId) {
|
898
|
-
return this.groupCallEventHandler.groupCalls.get(roomId) || null;
|
899
|
-
}
|
900
|
-
|
901
470
|
/**
|
902
471
|
* Get the current sync state.
|
903
472
|
* @returns the sync state, which may be null.
|
@@ -1000,11 +569,11 @@ export class MatrixClient extends TypedEventEmitter {
|
|
1000
569
|
* @returns Promise resolving with The capabilities of the homeserver
|
1001
570
|
*/
|
1002
571
|
getCapabilities() {
|
1003
|
-
var
|
572
|
+
var _this3 = this;
|
1004
573
|
return _asyncToGenerator(function* () {
|
1005
|
-
var caps =
|
574
|
+
var caps = _this3.serverCapabilitiesService.getCachedCapabilities();
|
1006
575
|
if (caps) return caps;
|
1007
|
-
return
|
576
|
+
return _this3.serverCapabilitiesService.fetchCapabilities();
|
1008
577
|
})();
|
1009
578
|
}
|
1010
579
|
|
@@ -1019,1856 +588,22 @@ export class MatrixClient extends TypedEventEmitter {
|
|
1019
588
|
}
|
1020
589
|
|
1021
590
|
/**
|
1022
|
-
* Fetches the latest capabilities from the homeserver, ignoring any cached
|
1023
|
-
* versions. The newly returned version is cached.
|
1024
|
-
*
|
1025
|
-
* @returns A promise which resolves to the capabilities of the homeserver
|
1026
|
-
*/
|
1027
|
-
fetchCapabilities() {
|
1028
|
-
return this.serverCapabilitiesService.fetchCapabilities();
|
1029
|
-
}
|
1030
|
-
|
1031
|
-
/**
|
1032
|
-
* Initialise support for end-to-end encryption in this client, using libolm.
|
1033
|
-
*
|
1034
|
-
* You should call this method after creating the matrixclient, but *before*
|
1035
|
-
* calling `startClient`, if you want to support end-to-end encryption.
|
1036
|
-
*
|
1037
|
-
* It will return a Promise which will resolve when the crypto layer has been
|
1038
|
-
* successfully initialised.
|
1039
|
-
*
|
1040
|
-
* @deprecated libolm is deprecated. Prefer {@link initRustCrypto}.
|
1041
|
-
*/
|
1042
|
-
initCrypto() {
|
1043
|
-
var _this11 = this;
|
1044
|
-
return _asyncToGenerator(function* () {
|
1045
|
-
if (!isCryptoAvailable()) {
|
1046
|
-
throw new Error("End-to-end encryption not supported in this js-sdk build: did " + "you remember to load the olm library?");
|
1047
|
-
}
|
1048
|
-
if (_this11.cryptoBackend) {
|
1049
|
-
_this11.logger.warn("Attempt to re-initialise e2e encryption on MatrixClient");
|
1050
|
-
return;
|
1051
|
-
}
|
1052
|
-
if (!_this11.cryptoStore) {
|
1053
|
-
// the cryptostore is provided by sdk.createClient, so this shouldn't happen
|
1054
|
-
throw new Error("Cannot enable encryption: no cryptoStore provided");
|
1055
|
-
}
|
1056
|
-
_this11.logger.debug("Crypto: Starting up crypto store...");
|
1057
|
-
yield _this11.cryptoStore.startup();
|
1058
|
-
var userId = _this11.getUserId();
|
1059
|
-
if (userId === null) {
|
1060
|
-
throw new Error("Cannot enable encryption on MatrixClient with unknown userId: " + "ensure userId is passed in createClient().");
|
1061
|
-
}
|
1062
|
-
if (_this11.deviceId === null) {
|
1063
|
-
throw new Error("Cannot enable encryption on MatrixClient with unknown deviceId: " + "ensure deviceId is passed in createClient().");
|
1064
|
-
}
|
1065
|
-
var crypto = new Crypto(_this11, userId, _this11.deviceId, _this11.store, _this11.cryptoStore, _this11.verificationMethods);
|
1066
|
-
_this11.reEmitter.reEmit(crypto, [LegacyCryptoEvent.KeyBackupFailed, LegacyCryptoEvent.KeyBackupSessionsRemaining, LegacyCryptoEvent.RoomKeyRequest, LegacyCryptoEvent.RoomKeyRequestCancellation, LegacyCryptoEvent.Warning, LegacyCryptoEvent.DevicesUpdated, LegacyCryptoEvent.WillUpdateDevices, LegacyCryptoEvent.DeviceVerificationChanged, LegacyCryptoEvent.UserTrustStatusChanged, LegacyCryptoEvent.KeysChanged]);
|
1067
|
-
_this11.logger.debug("Crypto: initialising crypto object...");
|
1068
|
-
yield crypto.init({
|
1069
|
-
exportedOlmDevice: _this11.exportedOlmDeviceToImport,
|
1070
|
-
pickleKey: _this11.pickleKey
|
1071
|
-
});
|
1072
|
-
delete _this11.exportedOlmDeviceToImport;
|
1073
|
-
_this11.olmVersion = Crypto.getOlmVersion();
|
1074
|
-
|
1075
|
-
// if crypto initialisation was successful, tell it to attach its event handlers.
|
1076
|
-
crypto.registerEventHandlers(_this11);
|
1077
|
-
_this11.cryptoBackend = _this11.crypto = crypto;
|
1078
|
-
|
1079
|
-
// upload our keys in the background
|
1080
|
-
_this11.crypto.uploadDeviceKeys().catch(e => {
|
1081
|
-
// TODO: throwing away this error is a really bad idea.
|
1082
|
-
_this11.logger.error("Error uploading device keys", e);
|
1083
|
-
});
|
1084
|
-
})();
|
1085
|
-
}
|
1086
|
-
|
1087
|
-
/**
|
1088
|
-
* Initialise support for end-to-end encryption in this client, using the rust matrix-sdk-crypto.
|
1089
|
-
*
|
1090
|
-
* An alternative to {@link initCrypto}.
|
1091
|
-
*
|
1092
|
-
* @param args.useIndexedDB - True to use an indexeddb store, false to use an in-memory store. Defaults to 'true'.
|
1093
|
-
* @param args.storageKey - A key with which to encrypt the indexeddb store. If provided, it must be exactly
|
1094
|
-
* 32 bytes of data, and must be the same each time the client is initialised for a given device.
|
1095
|
-
* If both this and `storagePassword` are unspecified, the store will be unencrypted.
|
1096
|
-
* @param args.storagePassword - An alternative to `storageKey`. A password which will be used to derive a key to
|
1097
|
-
* encrypt the store with. Deriving a key from a password is (deliberately) a slow operation, so prefer
|
1098
|
-
* to pass a `storageKey` directly where possible.
|
1099
|
-
*
|
1100
|
-
* @returns a Promise which will resolve when the crypto layer has been
|
1101
|
-
* successfully initialised.
|
1102
|
-
*/
|
1103
|
-
initRustCrypto() {
|
1104
|
-
var _arguments = arguments,
|
1105
|
-
_this12 = this;
|
1106
|
-
return _asyncToGenerator(function* () {
|
1107
|
-
var _this12$pickleKey;
|
1108
|
-
var args = _arguments.length > 0 && _arguments[0] !== undefined ? _arguments[0] : {};
|
1109
|
-
if (_this12.cryptoBackend) {
|
1110
|
-
_this12.logger.warn("Attempt to re-initialise e2e encryption on MatrixClient");
|
1111
|
-
return;
|
1112
|
-
}
|
1113
|
-
var userId = _this12.getUserId();
|
1114
|
-
if (userId === null) {
|
1115
|
-
throw new Error("Cannot enable encryption on MatrixClient with unknown userId: " + "ensure userId is passed in createClient().");
|
1116
|
-
}
|
1117
|
-
var deviceId = _this12.getDeviceId();
|
1118
|
-
if (deviceId === null) {
|
1119
|
-
throw new Error("Cannot enable encryption on MatrixClient with unknown deviceId: " + "ensure deviceId is passed in createClient().");
|
1120
|
-
}
|
1121
|
-
|
1122
|
-
// importing rust-crypto will download the webassembly, so we delay it until we know it will be
|
1123
|
-
// needed.
|
1124
|
-
_this12.logger.debug("Downloading Rust crypto library");
|
1125
|
-
var RustCrypto = yield import("./rust-crypto/index.js");
|
1126
|
-
var rustCrypto = yield RustCrypto.initRustCrypto({
|
1127
|
-
logger: _this12.logger,
|
1128
|
-
http: _this12.http,
|
1129
|
-
userId: userId,
|
1130
|
-
deviceId: deviceId,
|
1131
|
-
secretStorage: _this12.secretStorage,
|
1132
|
-
cryptoCallbacks: _this12.cryptoCallbacks,
|
1133
|
-
storePrefix: args.useIndexedDB === false ? null : RUST_SDK_STORE_PREFIX,
|
1134
|
-
storeKey: args.storageKey,
|
1135
|
-
storePassphrase: args.storagePassword,
|
1136
|
-
legacyCryptoStore: _this12.cryptoStore,
|
1137
|
-
legacyPickleKey: (_this12$pickleKey = _this12.pickleKey) !== null && _this12$pickleKey !== void 0 ? _this12$pickleKey : "DEFAULT_KEY",
|
1138
|
-
legacyMigrationProgressListener: (progress, total) => {
|
1139
|
-
_this12.emit(CryptoEvent.LegacyCryptoStoreMigrationProgress, progress, total);
|
1140
|
-
}
|
1141
|
-
});
|
1142
|
-
rustCrypto.setSupportedVerificationMethods(_this12.verificationMethods);
|
1143
|
-
_this12.cryptoBackend = rustCrypto;
|
1144
|
-
|
1145
|
-
// attach the event listeners needed by RustCrypto
|
1146
|
-
_this12.on(RoomMemberEvent.Membership, rustCrypto.onRoomMembership.bind(rustCrypto));
|
1147
|
-
_this12.on(ClientEvent.Event, event => {
|
1148
|
-
rustCrypto.onLiveEventFromSync(event);
|
1149
|
-
});
|
1150
|
-
|
1151
|
-
// re-emit the events emitted by the crypto impl
|
1152
|
-
_this12.reEmitter.reEmit(rustCrypto, [CryptoEvent.VerificationRequestReceived, CryptoEvent.UserTrustStatusChanged, CryptoEvent.KeyBackupStatus, CryptoEvent.KeyBackupSessionsRemaining, CryptoEvent.KeyBackupFailed, CryptoEvent.KeyBackupDecryptionKeyCached, CryptoEvent.KeysChanged, CryptoEvent.DevicesUpdated, CryptoEvent.WillUpdateDevices]);
|
1153
|
-
})();
|
1154
|
-
}
|
1155
|
-
|
1156
|
-
/**
|
1157
|
-
* Access the server-side secret storage API for this client.
|
1158
|
-
*/
|
1159
|
-
get secretStorage() {
|
1160
|
-
return this._secretStorage;
|
1161
|
-
}
|
1162
|
-
|
1163
|
-
/**
|
1164
|
-
* Access the crypto API for this client.
|
1165
|
-
*
|
1166
|
-
* If end-to-end encryption has been enabled for this client (via {@link initCrypto} or {@link initRustCrypto}),
|
1167
|
-
* returns an object giving access to the crypto API. Otherwise, returns `undefined`.
|
1168
|
-
*/
|
1169
|
-
getCrypto() {
|
1170
|
-
return this.cryptoBackend;
|
1171
|
-
}
|
1172
|
-
|
1173
|
-
/**
|
1174
|
-
* Is end-to-end crypto enabled for this client.
|
1175
|
-
* @returns True if end-to-end is enabled.
|
1176
|
-
* @deprecated prefer {@link getCrypto}
|
1177
|
-
*/
|
1178
|
-
isCryptoEnabled() {
|
1179
|
-
return !!this.cryptoBackend;
|
1180
|
-
}
|
1181
|
-
|
1182
|
-
/**
|
1183
|
-
* Get the Ed25519 key for this device
|
1184
|
-
*
|
1185
|
-
* @returns base64-encoded ed25519 key. Null if crypto is
|
1186
|
-
* disabled.
|
1187
|
-
*
|
1188
|
-
* @deprecated Not supported for Rust Cryptography.Prefer {@link CryptoApi.getOwnDeviceKeys}
|
1189
|
-
*/
|
1190
|
-
getDeviceEd25519Key() {
|
1191
|
-
var _this$crypto$getDevic, _this$crypto;
|
1192
|
-
return (_this$crypto$getDevic = (_this$crypto = this.crypto) === null || _this$crypto === void 0 ? void 0 : _this$crypto.getDeviceEd25519Key()) !== null && _this$crypto$getDevic !== void 0 ? _this$crypto$getDevic : null;
|
1193
|
-
}
|
1194
|
-
|
1195
|
-
/**
|
1196
|
-
* Get the Curve25519 key for this device
|
1197
|
-
*
|
1198
|
-
* @returns base64-encoded curve25519 key. Null if crypto is
|
1199
|
-
* disabled.
|
1200
|
-
*
|
1201
|
-
* @deprecated Not supported for Rust Cryptography. Use {@link CryptoApi.getOwnDeviceKeys}
|
1202
|
-
*/
|
1203
|
-
getDeviceCurve25519Key() {
|
1204
|
-
var _this$crypto$getDevic2, _this$crypto2;
|
1205
|
-
return (_this$crypto$getDevic2 = (_this$crypto2 = this.crypto) === null || _this$crypto2 === void 0 ? void 0 : _this$crypto2.getDeviceCurve25519Key()) !== null && _this$crypto$getDevic2 !== void 0 ? _this$crypto$getDevic2 : null;
|
1206
|
-
}
|
1207
|
-
|
1208
|
-
/**
|
1209
|
-
* @deprecated Does nothing.
|
1210
|
-
*/
|
1211
|
-
uploadKeys() {
|
1212
|
-
var _this13 = this;
|
1213
|
-
return _asyncToGenerator(function* () {
|
1214
|
-
_this13.logger.warn("MatrixClient.uploadKeys is deprecated");
|
1215
|
-
})();
|
1216
|
-
}
|
1217
|
-
|
1218
|
-
/**
|
1219
|
-
* Download the keys for a list of users and stores the keys in the session
|
1220
|
-
* store.
|
1221
|
-
* @param userIds - The users to fetch.
|
1222
|
-
* @param forceDownload - Always download the keys even if cached.
|
1223
|
-
*
|
1224
|
-
* @returns A promise which resolves to a map userId-\>deviceId-\>`DeviceInfo`
|
1225
|
-
*
|
1226
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
|
1227
|
-
*/
|
1228
|
-
downloadKeys(userIds, forceDownload) {
|
1229
|
-
if (!this.crypto) {
|
1230
|
-
return Promise.reject(new Error("End-to-end encryption disabled"));
|
1231
|
-
}
|
1232
|
-
return this.crypto.downloadKeys(userIds, forceDownload);
|
1233
|
-
}
|
1234
|
-
|
1235
|
-
/**
|
1236
|
-
* Get the stored device keys for a user id
|
1237
|
-
*
|
1238
|
-
* @param userId - the user to list keys for.
|
1239
|
-
*
|
1240
|
-
* @returns list of devices
|
1241
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
|
1242
|
-
*/
|
1243
|
-
getStoredDevicesForUser(userId) {
|
1244
|
-
if (!this.crypto) {
|
1245
|
-
throw new Error("End-to-end encryption disabled");
|
1246
|
-
}
|
1247
|
-
return this.crypto.getStoredDevicesForUser(userId) || [];
|
1248
|
-
}
|
1249
|
-
|
1250
|
-
/**
|
1251
|
-
* Get the stored device key for a user id and device id
|
1252
|
-
*
|
1253
|
-
* @param userId - the user to list keys for.
|
1254
|
-
* @param deviceId - unique identifier for the device
|
1255
|
-
*
|
1256
|
-
* @returns device or null
|
1257
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getUserDeviceInfo}
|
1258
|
-
*/
|
1259
|
-
getStoredDevice(userId, deviceId) {
|
1260
|
-
if (!this.crypto) {
|
1261
|
-
throw new Error("End-to-end encryption disabled");
|
1262
|
-
}
|
1263
|
-
return this.crypto.getStoredDevice(userId, deviceId) || null;
|
1264
|
-
}
|
1265
|
-
|
1266
|
-
/**
|
1267
|
-
* Mark the given device as verified
|
1268
|
-
*
|
1269
|
-
* @param userId - owner of the device
|
1270
|
-
* @param deviceId - unique identifier for the device or user's
|
1271
|
-
* cross-signing public key ID.
|
1272
|
-
*
|
1273
|
-
* @param verified - whether to mark the device as verified. defaults
|
1274
|
-
* to 'true'.
|
1275
|
-
*
|
1276
|
-
* @returns
|
1277
|
-
*
|
1278
|
-
* @remarks
|
1279
|
-
* Fires {@link CryptoEvent#DeviceVerificationChanged}
|
1280
|
-
*/
|
1281
|
-
setDeviceVerified(userId, deviceId) {
|
1282
|
-
var verified = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : true;
|
1283
|
-
var prom = this.setDeviceVerification(userId, deviceId, verified, null, null);
|
1284
|
-
|
1285
|
-
// if one of the user's own devices is being marked as verified / unverified,
|
1286
|
-
// check the key backup status, since whether or not we use this depends on
|
1287
|
-
// whether it has a signature from a verified device
|
1288
|
-
if (userId == this.credentials.userId) {
|
1289
|
-
this.checkKeyBackup();
|
1290
|
-
}
|
1291
|
-
return prom;
|
1292
|
-
}
|
1293
|
-
|
1294
|
-
/**
|
1295
|
-
* Mark the given device as blocked/unblocked
|
1296
|
-
*
|
1297
|
-
* @param userId - owner of the device
|
1298
|
-
* @param deviceId - unique identifier for the device or user's
|
1299
|
-
* cross-signing public key ID.
|
1300
|
-
*
|
1301
|
-
* @param blocked - whether to mark the device as blocked. defaults
|
1302
|
-
* to 'true'.
|
1303
|
-
*
|
1304
|
-
* @returns
|
1305
|
-
*
|
1306
|
-
* @remarks
|
1307
|
-
* Fires {@link LegacyCryptoEvent.DeviceVerificationChanged}
|
1308
|
-
*
|
1309
|
-
* @deprecated Not supported for Rust Cryptography.
|
1310
|
-
*/
|
1311
|
-
setDeviceBlocked(userId, deviceId) {
|
1312
|
-
var blocked = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : true;
|
1313
|
-
return this.setDeviceVerification(userId, deviceId, null, blocked, null);
|
1314
|
-
}
|
1315
|
-
|
1316
|
-
/**
|
1317
|
-
* Mark the given device as known/unknown
|
1318
|
-
*
|
1319
|
-
* @param userId - owner of the device
|
1320
|
-
* @param deviceId - unique identifier for the device or user's
|
1321
|
-
* cross-signing public key ID.
|
1322
|
-
*
|
1323
|
-
* @param known - whether to mark the device as known. defaults
|
1324
|
-
* to 'true'.
|
1325
|
-
*
|
1326
|
-
* @returns
|
1327
|
-
*
|
1328
|
-
* @remarks
|
1329
|
-
* Fires {@link CryptoEvent#DeviceVerificationChanged}
|
1330
|
-
*
|
1331
|
-
* @deprecated Not supported for Rust Cryptography.
|
1332
|
-
*/
|
1333
|
-
setDeviceKnown(userId, deviceId) {
|
1334
|
-
var known = arguments.length > 2 && arguments[2] !== undefined ? arguments[2] : true;
|
1335
|
-
return this.setDeviceVerification(userId, deviceId, null, null, known);
|
1336
|
-
}
|
1337
|
-
setDeviceVerification(userId, deviceId, verified, blocked, known) {
|
1338
|
-
var _this14 = this;
|
1339
|
-
return _asyncToGenerator(function* () {
|
1340
|
-
if (!_this14.crypto) {
|
1341
|
-
throw new Error("End-to-end encryption disabled");
|
1342
|
-
}
|
1343
|
-
yield _this14.crypto.setDeviceVerification(userId, deviceId, verified, blocked, known);
|
1344
|
-
})();
|
1345
|
-
}
|
1346
|
-
|
1347
|
-
/**
|
1348
|
-
* Request a key verification from another user, using a DM.
|
1349
|
-
*
|
1350
|
-
* @param userId - the user to request verification with
|
1351
|
-
* @param roomId - the room to use for verification
|
1352
|
-
*
|
1353
|
-
* @returns resolves to a VerificationRequest
|
1354
|
-
* when the request has been sent to the other party.
|
1355
|
-
*
|
1356
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.requestVerificationDM}.
|
1357
|
-
*/
|
1358
|
-
requestVerificationDM(userId, roomId) {
|
1359
|
-
if (!this.crypto) {
|
1360
|
-
throw new Error("End-to-end encryption disabled");
|
1361
|
-
}
|
1362
|
-
return this.crypto.requestVerificationDM(userId, roomId);
|
1363
|
-
}
|
1364
|
-
|
1365
|
-
/**
|
1366
|
-
* Finds a DM verification request that is already in progress for the given room id
|
1367
|
-
*
|
1368
|
-
* @param roomId - the room to use for verification
|
1369
|
-
*
|
1370
|
-
* @returns the VerificationRequest that is in progress, if any
|
1371
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.findVerificationRequestDMInProgress}.
|
1372
|
-
*/
|
1373
|
-
findVerificationRequestDMInProgress(roomId) {
|
1374
|
-
if (!this.cryptoBackend) {
|
1375
|
-
throw new Error("End-to-end encryption disabled");
|
1376
|
-
} else if (!this.crypto) {
|
1377
|
-
// Hack for element-R to avoid breaking the cypress tests. We can get rid of this once the react-sdk is
|
1378
|
-
// updated to use CryptoApi.findVerificationRequestDMInProgress.
|
1379
|
-
return undefined;
|
1380
|
-
}
|
1381
|
-
return this.crypto.findVerificationRequestDMInProgress(roomId);
|
1382
|
-
}
|
1383
|
-
|
1384
|
-
/**
|
1385
|
-
* Returns all to-device verification requests that are already in progress for the given user id
|
1386
|
-
*
|
1387
|
-
* @param userId - the ID of the user to query
|
1388
|
-
*
|
1389
|
-
* @returns the VerificationRequests that are in progress
|
1390
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.getVerificationRequestsToDeviceInProgress}.
|
1391
|
-
*/
|
1392
|
-
getVerificationRequestsToDeviceInProgress(userId) {
|
1393
|
-
if (!this.crypto) {
|
1394
|
-
throw new Error("End-to-end encryption disabled");
|
1395
|
-
}
|
1396
|
-
return this.crypto.getVerificationRequestsToDeviceInProgress(userId);
|
1397
|
-
}
|
1398
|
-
|
1399
|
-
/**
|
1400
|
-
* Request a key verification from another user.
|
1401
|
-
*
|
1402
|
-
* @param userId - the user to request verification with
|
1403
|
-
* @param devices - array of device IDs to send requests to. Defaults to
|
1404
|
-
* all devices owned by the user
|
1405
|
-
*
|
1406
|
-
* @returns resolves to a VerificationRequest
|
1407
|
-
* when the request has been sent to the other party.
|
1408
|
-
*
|
1409
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#requestOwnUserVerification} or {@link CryptoApi#requestDeviceVerification}.
|
1410
|
-
*/
|
1411
|
-
requestVerification(userId, devices) {
|
1412
|
-
if (!this.crypto) {
|
1413
|
-
throw new Error("End-to-end encryption disabled");
|
1414
|
-
}
|
1415
|
-
return this.crypto.requestVerification(userId, devices);
|
1416
|
-
}
|
1417
|
-
|
1418
|
-
/**
|
1419
|
-
* Begin a key verification.
|
1420
|
-
*
|
1421
|
-
* @param method - the verification method to use
|
1422
|
-
* @param userId - the user to verify keys with
|
1423
|
-
* @param deviceId - the device to verify
|
1424
|
-
*
|
1425
|
-
* @returns a verification object
|
1426
|
-
* @deprecated Prefer {@link CryptoApi#requestOwnUserVerification} or {@link CryptoApi#requestDeviceVerification}.
|
1427
|
-
*/
|
1428
|
-
beginKeyVerification(method, userId, deviceId) {
|
1429
|
-
if (!this.crypto) {
|
1430
|
-
throw new Error("End-to-end encryption disabled");
|
1431
|
-
}
|
1432
|
-
return this.crypto.beginKeyVerification(method, userId, deviceId);
|
1433
|
-
}
|
1434
|
-
|
1435
|
-
/**
|
1436
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#checkKey}.
|
1437
|
-
*/
|
1438
|
-
checkSecretStorageKey(key, info) {
|
1439
|
-
return this.secretStorage.checkKey(key, info);
|
1440
|
-
}
|
1441
|
-
|
1442
|
-
/**
|
1443
|
-
* Set the global override for whether the client should ever send encrypted
|
1444
|
-
* messages to unverified devices. This provides the default for rooms which
|
1445
|
-
* do not specify a value.
|
1446
|
-
*
|
1447
|
-
* @param value - whether to blacklist all unverified devices by default
|
1448
|
-
*
|
1449
|
-
* @deprecated Prefer direct access to {@link CryptoApi.globalBlacklistUnverifiedDevices}:
|
1450
|
-
*
|
1451
|
-
* ```javascript
|
1452
|
-
* client.getCrypto().globalBlacklistUnverifiedDevices = value;
|
1453
|
-
* ```
|
1454
|
-
*/
|
1455
|
-
setGlobalBlacklistUnverifiedDevices(value) {
|
1456
|
-
if (!this.cryptoBackend) {
|
1457
|
-
throw new Error("End-to-end encryption disabled");
|
1458
|
-
}
|
1459
|
-
this.cryptoBackend.globalBlacklistUnverifiedDevices = value;
|
1460
|
-
return value;
|
1461
|
-
}
|
1462
|
-
|
1463
|
-
/**
|
1464
|
-
* @returns whether to blacklist all unverified devices by default
|
1465
|
-
*
|
1466
|
-
* @deprecated Prefer direct access to {@link CryptoApi.globalBlacklistUnverifiedDevices}:
|
1467
|
-
*
|
1468
|
-
* ```javascript
|
1469
|
-
* value = client.getCrypto().globalBlacklistUnverifiedDevices;
|
1470
|
-
* ```
|
1471
|
-
*/
|
1472
|
-
getGlobalBlacklistUnverifiedDevices() {
|
1473
|
-
if (!this.cryptoBackend) {
|
1474
|
-
throw new Error("End-to-end encryption disabled");
|
1475
|
-
}
|
1476
|
-
return this.cryptoBackend.globalBlacklistUnverifiedDevices;
|
1477
|
-
}
|
1478
|
-
|
1479
|
-
/**
|
1480
|
-
* Set whether sendMessage in a room with unknown and unverified devices
|
1481
|
-
* should throw an error and not send them message. This has 'Global' for
|
1482
|
-
* symmetry with setGlobalBlacklistUnverifiedDevices but there is currently
|
1483
|
-
* no room-level equivalent for this setting.
|
1484
|
-
*
|
1485
|
-
* This API is currently UNSTABLE and may change or be removed without notice.
|
1486
|
-
*
|
1487
|
-
* It has no effect with the Rust crypto implementation.
|
1488
|
-
*
|
1489
|
-
* @param value - whether error on unknown devices
|
1490
|
-
*
|
1491
|
-
* ```ts
|
1492
|
-
* client.getCrypto().globalErrorOnUnknownDevices = value;
|
1493
|
-
* ```
|
1494
|
-
*/
|
1495
|
-
setGlobalErrorOnUnknownDevices(value) {
|
1496
|
-
if (!this.cryptoBackend) {
|
1497
|
-
throw new Error("End-to-end encryption disabled");
|
1498
|
-
}
|
1499
|
-
this.cryptoBackend.globalErrorOnUnknownDevices = value;
|
1500
|
-
}
|
1501
|
-
|
1502
|
-
/**
|
1503
|
-
* @returns whether to error on unknown devices
|
1504
|
-
*
|
1505
|
-
* This API is currently UNSTABLE and may change or be removed without notice.
|
1506
|
-
*/
|
1507
|
-
getGlobalErrorOnUnknownDevices() {
|
1508
|
-
if (!this.cryptoBackend) {
|
1509
|
-
throw new Error("End-to-end encryption disabled");
|
1510
|
-
}
|
1511
|
-
return this.cryptoBackend.globalErrorOnUnknownDevices;
|
1512
|
-
}
|
1513
|
-
|
1514
|
-
/**
|
1515
|
-
* Get the ID of one of the user's cross-signing keys
|
1516
|
-
*
|
1517
|
-
* @param type - The type of key to get the ID of. One of
|
1518
|
-
* "master", "self_signing", or "user_signing". Defaults to "master".
|
1519
|
-
*
|
1520
|
-
* @returns the key ID
|
1521
|
-
* @deprecated Not supported for Rust Cryptography. prefer {@link Crypto.CryptoApi#getCrossSigningKeyId}
|
1522
|
-
*/
|
1523
|
-
getCrossSigningId() {
|
1524
|
-
var type = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : CrossSigningKey.Master;
|
1525
|
-
if (!this.crypto) {
|
1526
|
-
throw new Error("End-to-end encryption disabled");
|
1527
|
-
}
|
1528
|
-
return this.crypto.getCrossSigningId(type);
|
1529
|
-
}
|
1530
|
-
|
1531
|
-
/**
|
1532
|
-
* Get the cross signing information for a given user.
|
1533
|
-
*
|
1534
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
1535
|
-
*
|
1536
|
-
* @param userId - the user ID to get the cross-signing info for.
|
1537
|
-
*
|
1538
|
-
* @returns the cross signing information for the user.
|
1539
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#userHasCrossSigningKeys}
|
1540
|
-
*/
|
1541
|
-
getStoredCrossSigningForUser(userId) {
|
1542
|
-
if (!this.cryptoBackend) {
|
1543
|
-
throw new Error("End-to-end encryption disabled");
|
1544
|
-
}
|
1545
|
-
return this.cryptoBackend.getStoredCrossSigningForUser(userId);
|
1546
|
-
}
|
1547
|
-
|
1548
|
-
/**
|
1549
|
-
* Check whether a given user is trusted.
|
1550
|
-
*
|
1551
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
1552
|
-
*
|
1553
|
-
* @param userId - The ID of the user to check.
|
1554
|
-
*
|
1555
|
-
* @deprecated Use {@link Crypto.CryptoApi.getUserVerificationStatus | `CryptoApi.getUserVerificationStatus`}
|
1556
|
-
*/
|
1557
|
-
checkUserTrust(userId) {
|
1558
|
-
if (!this.cryptoBackend) {
|
1559
|
-
throw new Error("End-to-end encryption disabled");
|
1560
|
-
}
|
1561
|
-
return this.cryptoBackend.checkUserTrust(userId);
|
1562
|
-
}
|
1563
|
-
|
1564
|
-
/**
|
1565
|
-
* Check whether a given device is trusted.
|
1566
|
-
*
|
1567
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
1568
|
-
*
|
1569
|
-
* @param userId - The ID of the user whose devices is to be checked.
|
1570
|
-
* @param deviceId - The ID of the device to check
|
1571
|
-
*
|
1572
|
-
* @deprecated Use {@link Crypto.CryptoApi.getDeviceVerificationStatus | `CryptoApi.getDeviceVerificationStatus`}
|
1573
|
-
*/
|
1574
|
-
checkDeviceTrust(userId, deviceId) {
|
1575
|
-
if (!this.crypto) {
|
1576
|
-
throw new Error("End-to-end encryption disabled");
|
1577
|
-
}
|
1578
|
-
return this.crypto.checkDeviceTrust(userId, deviceId);
|
1579
|
-
}
|
1580
|
-
|
1581
|
-
/**
|
1582
|
-
* Check whether one of our own devices is cross-signed by our
|
1583
|
-
* user's stored keys, regardless of whether we trust those keys yet.
|
1584
|
-
*
|
1585
|
-
* @param deviceId - The ID of the device to check
|
1586
|
-
*
|
1587
|
-
* @returns true if the device is cross-signed
|
1588
|
-
*
|
1589
|
-
* @deprecated Not supported for Rust Cryptography.
|
1590
|
-
*/
|
1591
|
-
checkIfOwnDeviceCrossSigned(deviceId) {
|
1592
|
-
if (!this.crypto) {
|
1593
|
-
throw new Error("End-to-end encryption disabled");
|
1594
|
-
}
|
1595
|
-
return this.crypto.checkIfOwnDeviceCrossSigned(deviceId);
|
1596
|
-
}
|
1597
|
-
|
1598
|
-
/**
|
1599
|
-
* Check the copy of our cross-signing key that we have in the device list and
|
1600
|
-
* see if we can get the private key. If so, mark it as trusted.
|
1601
|
-
* @param opts - ICheckOwnCrossSigningTrustOpts object
|
1602
|
-
*
|
1603
|
-
* @deprecated Unneeded for the new crypto
|
1604
|
-
*/
|
1605
|
-
checkOwnCrossSigningTrust(opts) {
|
1606
|
-
if (!this.cryptoBackend) {
|
1607
|
-
throw new Error("End-to-end encryption disabled");
|
1608
|
-
}
|
1609
|
-
return this.cryptoBackend.checkOwnCrossSigningTrust(opts);
|
1610
|
-
}
|
1611
|
-
|
1612
|
-
/**
|
1613
|
-
* Checks that a given cross-signing private key matches a given public key.
|
1614
|
-
* This can be used by the getCrossSigningKey callback to verify that the
|
1615
|
-
* private key it is about to supply is the one that was requested.
|
1616
|
-
* @param privateKey - The private key
|
1617
|
-
* @param expectedPublicKey - The public key
|
1618
|
-
* @returns true if the key matches, otherwise false
|
1619
|
-
*
|
1620
|
-
* @deprecated Not supported for Rust Cryptography.
|
1621
|
-
*/
|
1622
|
-
checkCrossSigningPrivateKey(privateKey, expectedPublicKey) {
|
1623
|
-
if (!this.crypto) {
|
1624
|
-
throw new Error("End-to-end encryption disabled");
|
1625
|
-
}
|
1626
|
-
return this.crypto.checkCrossSigningPrivateKey(privateKey, expectedPublicKey);
|
1627
|
-
}
|
1628
|
-
|
1629
|
-
/**
|
1630
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi#requestDeviceVerification}.
|
1631
|
-
*/
|
1632
|
-
legacyDeviceVerification(userId, deviceId, method) {
|
1633
|
-
if (!this.crypto) {
|
1634
|
-
throw new Error("End-to-end encryption disabled");
|
1635
|
-
}
|
1636
|
-
return this.crypto.legacyDeviceVerification(userId, deviceId, method);
|
1637
|
-
}
|
1638
|
-
|
1639
|
-
/**
|
1640
|
-
* Perform any background tasks that can be done before a message is ready to
|
1641
|
-
* send, in order to speed up sending of the message.
|
1642
|
-
* @param room - the room the event is in
|
1643
|
-
*
|
1644
|
-
* @deprecated Prefer {@link CryptoApi.prepareToEncrypt | `CryptoApi.prepareToEncrypt`}:
|
1645
|
-
*
|
1646
|
-
* ```javascript
|
1647
|
-
* client.getCrypto().prepareToEncrypt(room);
|
1648
|
-
* ```
|
1649
|
-
*/
|
1650
|
-
prepareToEncrypt(room) {
|
1651
|
-
if (!this.cryptoBackend) {
|
1652
|
-
throw new Error("End-to-end encryption disabled");
|
1653
|
-
}
|
1654
|
-
this.cryptoBackend.prepareToEncrypt(room);
|
1655
|
-
}
|
1656
|
-
|
1657
|
-
/**
|
1658
|
-
* Checks if the user has previously published cross-signing keys
|
1659
|
-
*
|
1660
|
-
* This means downloading the devicelist for the user and checking if the list includes
|
1661
|
-
* the cross-signing pseudo-device.
|
1662
|
-
*
|
1663
|
-
* @deprecated Prefer {@link CryptoApi.userHasCrossSigningKeys | `CryptoApi.userHasCrossSigningKeys`}:
|
1664
|
-
*
|
1665
|
-
* ```javascript
|
1666
|
-
* result = client.getCrypto().userHasCrossSigningKeys();
|
1667
|
-
* ```
|
1668
|
-
*/
|
1669
|
-
userHasCrossSigningKeys() {
|
1670
|
-
if (!this.cryptoBackend) {
|
1671
|
-
throw new Error("End-to-end encryption disabled");
|
1672
|
-
}
|
1673
|
-
return this.cryptoBackend.userHasCrossSigningKeys();
|
1674
|
-
}
|
1675
|
-
|
1676
|
-
/**
|
1677
|
-
* Checks whether cross signing:
|
1678
|
-
* - is enabled on this account and trusted by this device
|
1679
|
-
* - has private keys either cached locally or stored in secret storage
|
1680
|
-
*
|
1681
|
-
* If this function returns false, bootstrapCrossSigning() can be used
|
1682
|
-
* to fix things such that it returns true. That is to say, after
|
1683
|
-
* bootstrapCrossSigning() completes successfully, this function should
|
1684
|
-
* return true.
|
1685
|
-
* @returns True if cross-signing is ready to be used on this device
|
1686
|
-
* @deprecated Prefer {@link CryptoApi.isCrossSigningReady | `CryptoApi.isCrossSigningReady`}:
|
1687
|
-
*/
|
1688
|
-
isCrossSigningReady() {
|
1689
|
-
if (!this.cryptoBackend) {
|
1690
|
-
throw new Error("End-to-end encryption disabled");
|
1691
|
-
}
|
1692
|
-
return this.cryptoBackend.isCrossSigningReady();
|
1693
|
-
}
|
1694
|
-
|
1695
|
-
/**
|
1696
|
-
* Bootstrap cross-signing by creating keys if needed. If everything is already
|
1697
|
-
* set up, then no changes are made, so this is safe to run to ensure
|
1698
|
-
* cross-signing is ready for use.
|
1699
|
-
*
|
1700
|
-
* This function:
|
1701
|
-
* - creates new cross-signing keys if they are not found locally cached nor in
|
1702
|
-
* secret storage (if it has been set up)
|
1703
|
-
*
|
1704
|
-
* @deprecated Prefer {@link CryptoApi.bootstrapCrossSigning | `CryptoApi.bootstrapCrossSigning`}.
|
1705
|
-
*/
|
1706
|
-
bootstrapCrossSigning(opts) {
|
1707
|
-
if (!this.cryptoBackend) {
|
1708
|
-
throw new Error("End-to-end encryption disabled");
|
1709
|
-
}
|
1710
|
-
return this.cryptoBackend.bootstrapCrossSigning(opts);
|
1711
|
-
}
|
1712
|
-
|
1713
|
-
/**
|
1714
|
-
* Whether to trust a others users signatures of their devices.
|
1715
|
-
* If false, devices will only be considered 'verified' if we have
|
1716
|
-
* verified that device individually (effectively disabling cross-signing).
|
1717
|
-
*
|
1718
|
-
* Default: true
|
1719
|
-
*
|
1720
|
-
* @returns True if trusting cross-signed devices
|
1721
|
-
*
|
1722
|
-
* @deprecated Prefer {@link CryptoApi.getTrustCrossSignedDevices | `CryptoApi.getTrustCrossSignedDevices`}.
|
1723
|
-
*/
|
1724
|
-
getCryptoTrustCrossSignedDevices() {
|
1725
|
-
if (!this.cryptoBackend) {
|
1726
|
-
throw new Error("End-to-end encryption disabled");
|
1727
|
-
}
|
1728
|
-
return this.cryptoBackend.getTrustCrossSignedDevices();
|
1729
|
-
}
|
1730
|
-
|
1731
|
-
/**
|
1732
|
-
* See getCryptoTrustCrossSignedDevices
|
1733
|
-
*
|
1734
|
-
* @param val - True to trust cross-signed devices
|
1735
|
-
*
|
1736
|
-
* @deprecated Prefer {@link CryptoApi.setTrustCrossSignedDevices | `CryptoApi.setTrustCrossSignedDevices`}.
|
1737
|
-
*/
|
1738
|
-
setCryptoTrustCrossSignedDevices(val) {
|
1739
|
-
if (!this.cryptoBackend) {
|
1740
|
-
throw new Error("End-to-end encryption disabled");
|
1741
|
-
}
|
1742
|
-
this.cryptoBackend.setTrustCrossSignedDevices(val);
|
1743
|
-
}
|
1744
|
-
|
1745
|
-
/**
|
1746
|
-
* Counts the number of end to end session keys that are waiting to be backed up
|
1747
|
-
* @returns Promise which resolves to the number of sessions requiring backup
|
1748
|
-
*
|
1749
|
-
* @deprecated Not supported for Rust Cryptography.
|
1750
|
-
*/
|
1751
|
-
countSessionsNeedingBackup() {
|
1752
|
-
if (!this.crypto) {
|
1753
|
-
throw new Error("End-to-end encryption disabled");
|
1754
|
-
}
|
1755
|
-
return this.crypto.countSessionsNeedingBackup();
|
1756
|
-
}
|
1757
|
-
|
1758
|
-
/**
|
1759
|
-
* Get information about the encryption of an event
|
1760
|
-
*
|
1761
|
-
* @param event - event to be checked
|
1762
|
-
* @returns The event information.
|
1763
|
-
* @deprecated Prefer {@link Crypto.CryptoApi.getEncryptionInfoForEvent | `CryptoApi.getEncryptionInfoForEvent`}.
|
1764
|
-
*/
|
1765
|
-
getEventEncryptionInfo(event) {
|
1766
|
-
if (!this.cryptoBackend) {
|
1767
|
-
throw new Error("End-to-end encryption disabled");
|
1768
|
-
}
|
1769
|
-
return this.cryptoBackend.getEventEncryptionInfo(event);
|
1770
|
-
}
|
1771
|
-
|
1772
|
-
/**
|
1773
|
-
* Create a recovery key from a user-supplied passphrase.
|
1774
|
-
*
|
1775
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1776
|
-
*
|
1777
|
-
* @param password - Passphrase string that can be entered by the user
|
1778
|
-
* when restoring the backup as an alternative to entering the recovery key.
|
1779
|
-
* Optional.
|
1780
|
-
* @returns Object with public key metadata, encoded private
|
1781
|
-
* recovery key which should be disposed of after displaying to the user,
|
1782
|
-
* and raw private key to avoid round tripping if needed.
|
1783
|
-
*
|
1784
|
-
* @deprecated Prefer {@link CryptoApi.createRecoveryKeyFromPassphrase | `CryptoApi.createRecoveryKeyFromPassphrase`}.
|
1785
|
-
*/
|
1786
|
-
createRecoveryKeyFromPassphrase(password) {
|
1787
|
-
if (!this.cryptoBackend) {
|
1788
|
-
throw new Error("End-to-end encryption disabled");
|
1789
|
-
}
|
1790
|
-
return this.cryptoBackend.createRecoveryKeyFromPassphrase(password);
|
1791
|
-
}
|
1792
|
-
|
1793
|
-
/**
|
1794
|
-
* Checks whether secret storage:
|
1795
|
-
* - is enabled on this account
|
1796
|
-
* - is storing cross-signing private keys
|
1797
|
-
* - is storing session backup key (if enabled)
|
1798
|
-
*
|
1799
|
-
* If this function returns false, bootstrapSecretStorage() can be used
|
1800
|
-
* to fix things such that it returns true. That is to say, after
|
1801
|
-
* bootstrapSecretStorage() completes successfully, this function should
|
1802
|
-
* return true.
|
1803
|
-
*
|
1804
|
-
* @returns True if secret storage is ready to be used on this device
|
1805
|
-
* @deprecated Prefer {@link CryptoApi.isSecretStorageReady | `CryptoApi.isSecretStorageReady`}.
|
1806
|
-
*/
|
1807
|
-
isSecretStorageReady() {
|
1808
|
-
if (!this.cryptoBackend) {
|
1809
|
-
throw new Error("End-to-end encryption disabled");
|
1810
|
-
}
|
1811
|
-
return this.cryptoBackend.isSecretStorageReady();
|
1812
|
-
}
|
1813
|
-
|
1814
|
-
/**
|
1815
|
-
* Bootstrap Secure Secret Storage if needed by creating a default key. If everything is
|
1816
|
-
* already set up, then no changes are made, so this is safe to run to ensure secret
|
1817
|
-
* storage is ready for use.
|
1818
|
-
*
|
1819
|
-
* This function
|
1820
|
-
* - creates a new Secure Secret Storage key if no default key exists
|
1821
|
-
* - if a key backup exists, it is migrated to store the key in the Secret
|
1822
|
-
* Storage
|
1823
|
-
* - creates a backup if none exists, and one is requested
|
1824
|
-
* - migrates Secure Secret Storage to use the latest algorithm, if an outdated
|
1825
|
-
* algorithm is found
|
1826
|
-
*
|
1827
|
-
* @deprecated Use {@link CryptoApi.bootstrapSecretStorage | `CryptoApi.bootstrapSecretStorage`}.
|
1828
|
-
*/
|
1829
|
-
bootstrapSecretStorage(opts) {
|
1830
|
-
if (!this.cryptoBackend) {
|
1831
|
-
throw new Error("End-to-end encryption disabled");
|
1832
|
-
}
|
1833
|
-
return this.cryptoBackend.bootstrapSecretStorage(opts);
|
1834
|
-
}
|
1835
|
-
|
1836
|
-
/**
|
1837
|
-
* Add a key for encrypting secrets.
|
1838
|
-
*
|
1839
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1840
|
-
*
|
1841
|
-
* @param algorithm - the algorithm used by the key
|
1842
|
-
* @param opts - the options for the algorithm. The properties used
|
1843
|
-
* depend on the algorithm given.
|
1844
|
-
* @param keyName - the name of the key. If not given, a random name will be generated.
|
1845
|
-
*
|
1846
|
-
* @returns An object with:
|
1847
|
-
* keyId: the ID of the key
|
1848
|
-
* keyInfo: details about the key (iv, mac, passphrase)
|
1849
|
-
*
|
1850
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#addKey}.
|
1851
|
-
*/
|
1852
|
-
addSecretStorageKey(algorithm, opts, keyName) {
|
1853
|
-
return this.secretStorage.addKey(algorithm, opts, keyName);
|
1854
|
-
}
|
1855
|
-
|
1856
|
-
/**
|
1857
|
-
* Check whether we have a key with a given ID.
|
1858
|
-
*
|
1859
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1860
|
-
*
|
1861
|
-
* @param keyId - The ID of the key to check
|
1862
|
-
* for. Defaults to the default key ID if not provided.
|
1863
|
-
* @returns Whether we have the key.
|
1864
|
-
*
|
1865
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#hasKey}.
|
1866
|
-
*/
|
1867
|
-
hasSecretStorageKey(keyId) {
|
1868
|
-
return this.secretStorage.hasKey(keyId);
|
1869
|
-
}
|
1870
|
-
|
1871
|
-
/**
|
1872
|
-
* Store an encrypted secret on the server.
|
1873
|
-
*
|
1874
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1875
|
-
*
|
1876
|
-
* @param name - The name of the secret
|
1877
|
-
* @param secret - The secret contents.
|
1878
|
-
* @param keys - The IDs of the keys to use to encrypt the secret or null/undefined
|
1879
|
-
* to use the default (will throw if no default key is set).
|
1880
|
-
*
|
1881
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#store}.
|
1882
|
-
*/
|
1883
|
-
storeSecret(name, secret, keys) {
|
1884
|
-
return this.secretStorage.store(name, secret, keys);
|
1885
|
-
}
|
1886
|
-
|
1887
|
-
/**
|
1888
|
-
* Get a secret from storage.
|
1889
|
-
*
|
1890
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1891
|
-
*
|
1892
|
-
* @param name - the name of the secret
|
1893
|
-
*
|
1894
|
-
* @returns the contents of the secret
|
1895
|
-
*
|
1896
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#get}.
|
1897
|
-
*/
|
1898
|
-
getSecret(name) {
|
1899
|
-
return this.secretStorage.get(name);
|
1900
|
-
}
|
1901
|
-
|
1902
|
-
/**
|
1903
|
-
* Check if a secret is stored on the server.
|
1904
|
-
*
|
1905
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1906
|
-
*
|
1907
|
-
* @param name - the name of the secret
|
1908
|
-
* @returns map of key name to key info the secret is encrypted
|
1909
|
-
* with, or null if it is not present or not encrypted with a trusted
|
1910
|
-
* key
|
1911
|
-
*
|
1912
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#isStored}.
|
1913
|
-
*/
|
1914
|
-
isSecretStored(name) {
|
1915
|
-
return this.secretStorage.isStored(name);
|
1916
|
-
}
|
1917
|
-
|
1918
|
-
/**
|
1919
|
-
* Request a secret from another device.
|
1920
|
-
*
|
1921
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1922
|
-
*
|
1923
|
-
* @param name - the name of the secret to request
|
1924
|
-
* @param devices - the devices to request the secret from
|
1925
|
-
*
|
1926
|
-
* @returns the secret request object
|
1927
|
-
* @deprecated Not supported for Rust Cryptography.
|
1928
|
-
*/
|
1929
|
-
requestSecret(name, devices) {
|
1930
|
-
if (!this.crypto) {
|
1931
|
-
throw new Error("End-to-end encryption disabled");
|
1932
|
-
}
|
1933
|
-
return this.crypto.requestSecret(name, devices);
|
1934
|
-
}
|
1935
|
-
|
1936
|
-
/**
|
1937
|
-
* Get the current default key ID for encrypting secrets.
|
1938
|
-
*
|
1939
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1940
|
-
*
|
1941
|
-
* @returns The default key ID or null if no default key ID is set
|
1942
|
-
*
|
1943
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#getDefaultKeyId}.
|
1944
|
-
*/
|
1945
|
-
getDefaultSecretStorageKeyId() {
|
1946
|
-
return this.secretStorage.getDefaultKeyId();
|
1947
|
-
}
|
1948
|
-
|
1949
|
-
/**
|
1950
|
-
* Set the current default key ID for encrypting secrets.
|
1951
|
-
*
|
1952
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1953
|
-
*
|
1954
|
-
* @param keyId - The new default key ID
|
1955
|
-
*
|
1956
|
-
* @deprecated Use {@link MatrixClient#secretStorage} and {@link SecretStorage.ServerSideSecretStorage#setDefaultKeyId}.
|
1957
|
-
*/
|
1958
|
-
setDefaultSecretStorageKeyId(keyId) {
|
1959
|
-
return this.secretStorage.setDefaultKeyId(keyId);
|
1960
|
-
}
|
1961
|
-
|
1962
|
-
/**
|
1963
|
-
* Checks that a given secret storage private key matches a given public key.
|
1964
|
-
* This can be used by the getSecretStorageKey callback to verify that the
|
1965
|
-
* private key it is about to supply is the one that was requested.
|
1966
|
-
*
|
1967
|
-
* The Secure Secret Storage API is currently UNSTABLE and may change without notice.
|
1968
|
-
*
|
1969
|
-
* @param privateKey - The private key
|
1970
|
-
* @param expectedPublicKey - The public key
|
1971
|
-
* @returns true if the key matches, otherwise false
|
1972
|
-
*
|
1973
|
-
* @deprecated The use of asymmetric keys for SSSS is deprecated.
|
1974
|
-
* Use {@link SecretStorage.ServerSideSecretStorage#checkKey} for symmetric keys.
|
1975
|
-
*/
|
1976
|
-
checkSecretStoragePrivateKey(privateKey, expectedPublicKey) {
|
1977
|
-
if (!this.crypto) {
|
1978
|
-
throw new Error("End-to-end encryption disabled");
|
1979
|
-
}
|
1980
|
-
return this.crypto.checkSecretStoragePrivateKey(privateKey, expectedPublicKey);
|
1981
|
-
}
|
1982
|
-
|
1983
|
-
/**
|
1984
|
-
* Get e2e information on the device that sent an event
|
1985
|
-
*
|
1986
|
-
* @param event - event to be checked
|
1987
|
-
* @deprecated Not supported for Rust Cryptography.
|
1988
|
-
*/
|
1989
|
-
getEventSenderDeviceInfo(event) {
|
1990
|
-
var _this15 = this;
|
1991
|
-
return _asyncToGenerator(function* () {
|
1992
|
-
if (!_this15.crypto) {
|
1993
|
-
return null;
|
1994
|
-
}
|
1995
|
-
return _this15.crypto.getEventSenderDeviceInfo(event);
|
1996
|
-
})();
|
1997
|
-
}
|
1998
|
-
|
1999
|
-
/**
|
2000
|
-
* Check if the sender of an event is verified
|
2001
|
-
*
|
2002
|
-
* @param event - event to be checked
|
2003
|
-
*
|
2004
|
-
* @returns true if the sender of this event has been verified using
|
2005
|
-
* {@link MatrixClient#setDeviceVerified}.
|
2006
|
-
*
|
2007
|
-
* @deprecated Not supported for Rust Cryptography.
|
2008
|
-
*/
|
2009
|
-
isEventSenderVerified(event) {
|
2010
|
-
var _this16 = this;
|
2011
|
-
return _asyncToGenerator(function* () {
|
2012
|
-
var device = yield _this16.getEventSenderDeviceInfo(event);
|
2013
|
-
if (!device) {
|
2014
|
-
return false;
|
2015
|
-
}
|
2016
|
-
return device.isVerified();
|
2017
|
-
})();
|
2018
|
-
}
|
2019
|
-
|
2020
|
-
/**
|
2021
|
-
* Get outgoing room key request for this event if there is one.
|
2022
|
-
* @param event - The event to check for
|
2023
|
-
*
|
2024
|
-
* @returns A room key request, or null if there is none
|
2025
|
-
*
|
2026
|
-
* @deprecated Not supported for Rust Cryptography.
|
2027
|
-
*/
|
2028
|
-
getOutgoingRoomKeyRequest(event) {
|
2029
|
-
if (!this.crypto) {
|
2030
|
-
throw new Error("End-to-End encryption disabled");
|
2031
|
-
}
|
2032
|
-
var wireContent = event.getWireContent();
|
2033
|
-
var requestBody = {
|
2034
|
-
session_id: wireContent.session_id,
|
2035
|
-
sender_key: wireContent.sender_key,
|
2036
|
-
algorithm: wireContent.algorithm,
|
2037
|
-
room_id: event.getRoomId()
|
2038
|
-
};
|
2039
|
-
if (!requestBody.session_id || !requestBody.sender_key || !requestBody.algorithm || !requestBody.room_id) {
|
2040
|
-
return Promise.resolve(null);
|
2041
|
-
}
|
2042
|
-
return this.crypto.cryptoStore.getOutgoingRoomKeyRequest(requestBody);
|
2043
|
-
}
|
2044
|
-
|
2045
|
-
/**
|
2046
|
-
* Cancel a room key request for this event if one is ongoing and resend the
|
2047
|
-
* request.
|
2048
|
-
* @param event - event of which to cancel and resend the room
|
2049
|
-
* key request.
|
2050
|
-
* @returns A promise that will resolve when the key request is queued
|
2051
|
-
*
|
2052
|
-
* @deprecated Not supported for Rust Cryptography.
|
2053
|
-
*/
|
2054
|
-
cancelAndResendEventRoomKeyRequest(event) {
|
2055
|
-
if (!this.crypto) {
|
2056
|
-
throw new Error("End-to-End encryption disabled");
|
2057
|
-
}
|
2058
|
-
return event.cancelAndResendKeyRequest(this.crypto, this.getUserId());
|
2059
|
-
}
|
2060
|
-
|
2061
|
-
/**
|
2062
|
-
* Enable end-to-end encryption for a room. This does not modify room state.
|
2063
|
-
* Any messages sent before the returned promise resolves will be sent unencrypted.
|
2064
|
-
* @param roomId - The room ID to enable encryption in.
|
2065
|
-
* @param config - The encryption config for the room.
|
2066
|
-
* @returns A promise that will resolve when encryption is set up.
|
2067
|
-
*
|
2068
|
-
* @deprecated Not supported for Rust Cryptography. To enable encryption in a room, send an `m.room.encryption`
|
2069
|
-
* state event.
|
2070
|
-
*/
|
2071
|
-
setRoomEncryption(roomId, config) {
|
2072
|
-
if (!this.crypto) {
|
2073
|
-
throw new Error("End-to-End encryption disabled");
|
2074
|
-
}
|
2075
|
-
return this.crypto.setRoomEncryption(roomId, config);
|
2076
|
-
}
|
2077
|
-
|
2078
|
-
/**
|
2079
|
-
* Whether encryption is enabled for a room.
|
2080
|
-
* @param roomId - the room id to query.
|
2081
|
-
* @returns whether encryption is enabled.
|
2082
|
-
*
|
2083
|
-
* @deprecated Not correctly supported for Rust Cryptography. Use {@link CryptoApi.isEncryptionEnabledInRoom} and/or
|
2084
|
-
* {@link Room.hasEncryptionStateEvent}.
|
2085
|
-
*/
|
2086
|
-
isRoomEncrypted(roomId) {
|
2087
|
-
var _this$crypto$isRoomEn, _this$crypto3;
|
2088
|
-
var room = this.getRoom(roomId);
|
2089
|
-
if (!room) {
|
2090
|
-
// we don't know about this room, so can't determine if it should be
|
2091
|
-
// encrypted. Let's assume not.
|
2092
|
-
return false;
|
2093
|
-
}
|
2094
|
-
|
2095
|
-
// if there is an 'm.room.encryption' event in this room, it should be
|
2096
|
-
// encrypted (independently of whether we actually support encryption)
|
2097
|
-
if (room.hasEncryptionStateEvent()) {
|
2098
|
-
return true;
|
2099
|
-
}
|
2100
|
-
|
2101
|
-
// we don't have an m.room.encrypted event, but that might be because
|
2102
|
-
// the server is hiding it from us. Check the store to see if it was
|
2103
|
-
// previously encrypted.
|
2104
|
-
return (_this$crypto$isRoomEn = (_this$crypto3 = this.crypto) === null || _this$crypto3 === void 0 ? void 0 : _this$crypto3.isRoomEncrypted(roomId)) !== null && _this$crypto$isRoomEn !== void 0 ? _this$crypto$isRoomEn : false;
|
2105
|
-
}
|
2106
|
-
|
2107
|
-
/**
|
2108
|
-
* Encrypts and sends a given object via Olm to-device messages to a given
|
2109
|
-
* set of devices.
|
2110
|
-
*
|
2111
|
-
* @param userDeviceInfoArr - list of deviceInfo objects representing the devices to send to
|
2112
|
-
*
|
2113
|
-
* @param payload - fields to include in the encrypted payload
|
2114
|
-
*
|
2115
|
-
* @returns Promise which
|
2116
|
-
* resolves once the message has been encrypted and sent to the given
|
2117
|
-
* userDeviceMap, and returns the `{ contentMap, deviceInfoByDeviceId }`
|
2118
|
-
* of the successfully sent messages.
|
2119
|
-
*
|
2120
|
-
* @deprecated Instead use {@link CryptoApi.encryptToDeviceMessages} followed by {@link queueToDevice}.
|
2121
|
-
*/
|
2122
|
-
encryptAndSendToDevices(userDeviceInfoArr, payload) {
|
2123
|
-
if (!this.crypto) {
|
2124
|
-
throw new Error("End-to-End encryption disabled");
|
2125
|
-
}
|
2126
|
-
return this.crypto.encryptAndSendToDevices(userDeviceInfoArr, payload);
|
2127
|
-
}
|
2128
|
-
|
2129
|
-
/**
|
2130
|
-
* Forces the current outbound group session to be discarded such
|
2131
|
-
* that another one will be created next time an event is sent.
|
2132
|
-
*
|
2133
|
-
* @param roomId - The ID of the room to discard the session for
|
2134
|
-
*
|
2135
|
-
* @deprecated Prefer {@link CryptoApi.forceDiscardSession | `CryptoApi.forceDiscardSession`}:
|
2136
|
-
*/
|
2137
|
-
forceDiscardSession(roomId) {
|
2138
|
-
if (!this.cryptoBackend) {
|
2139
|
-
throw new Error("End-to-End encryption disabled");
|
2140
|
-
}
|
2141
|
-
this.cryptoBackend.forceDiscardSession(roomId);
|
2142
|
-
}
|
2143
|
-
|
2144
|
-
/**
|
2145
|
-
* Get a list containing all of the room keys
|
2146
|
-
*
|
2147
|
-
* This should be encrypted before returning it to the user.
|
2148
|
-
*
|
2149
|
-
* @returns a promise which resolves to a list of session export objects
|
2150
|
-
*
|
2151
|
-
* @deprecated Prefer {@link CryptoApi.exportRoomKeys | `CryptoApi.exportRoomKeys`}:
|
2152
|
-
*
|
2153
|
-
* ```javascript
|
2154
|
-
* sessionData = await client.getCrypto().exportRoomKeys();
|
2155
|
-
* ```
|
2156
|
-
*/
|
2157
|
-
exportRoomKeys() {
|
2158
|
-
if (!this.cryptoBackend) {
|
2159
|
-
return Promise.reject(new Error("End-to-end encryption disabled"));
|
2160
|
-
}
|
2161
|
-
return this.cryptoBackend.exportRoomKeys();
|
2162
|
-
}
|
2163
|
-
|
2164
|
-
/**
|
2165
|
-
* Import a list of room keys previously exported by exportRoomKeys
|
2166
|
-
*
|
2167
|
-
* @param keys - a list of session export objects
|
2168
|
-
* @param opts - options object
|
2169
|
-
*
|
2170
|
-
* @returns a promise which resolves when the keys have been imported
|
2171
|
-
*
|
2172
|
-
* @deprecated Prefer {@link CryptoApi.importRoomKeys | `CryptoApi.importRoomKeys`}:
|
2173
|
-
* ```javascript
|
2174
|
-
* await client.getCrypto()?.importRoomKeys([..]);
|
2175
|
-
* ```
|
2176
|
-
*/
|
2177
|
-
importRoomKeys(keys, opts) {
|
2178
|
-
if (!this.cryptoBackend) {
|
2179
|
-
throw new Error("End-to-end encryption disabled");
|
2180
|
-
}
|
2181
|
-
return this.cryptoBackend.importRoomKeys(keys, opts);
|
2182
|
-
}
|
2183
|
-
|
2184
|
-
/**
|
2185
|
-
* Force a re-check of the local key backup status against
|
2186
|
-
* what's on the server.
|
2187
|
-
*
|
2188
|
-
* @returns Object with backup info (as returned by
|
2189
|
-
* getKeyBackupVersion) in backupInfo and
|
2190
|
-
* trust information (as returned by isKeyBackupTrusted)
|
2191
|
-
* in trustInfo.
|
2192
|
-
*
|
2193
|
-
* @deprecated Prefer {@link Crypto.CryptoApi.checkKeyBackupAndEnable}.
|
2194
|
-
*/
|
2195
|
-
checkKeyBackup() {
|
2196
|
-
if (!this.crypto) {
|
2197
|
-
throw new Error("End-to-end encryption disabled");
|
2198
|
-
}
|
2199
|
-
return this.crypto.backupManager.checkKeyBackup();
|
2200
|
-
}
|
2201
|
-
|
2202
|
-
/**
|
2203
|
-
* Get information about the current key backup from the server.
|
2204
|
-
*
|
2205
|
-
* Performs some basic validity checks on the shape of the result, and raises an error if it is not as expected.
|
2206
|
-
*
|
2207
|
-
* **Note**: there is no (supported) way to distinguish between "failure to talk to the server" and "another client
|
2208
|
-
* uploaded a key backup version using an algorithm I don't understand.
|
2209
|
-
*
|
2210
|
-
* @returns Information object from API, or null if no backup is present on the server.
|
2211
|
-
*
|
2212
|
-
* @deprecated Prefer {@link CryptoApi.getKeyBackupInfo}.
|
2213
|
-
*/
|
2214
|
-
getKeyBackupVersion() {
|
2215
|
-
var _this17 = this;
|
2216
|
-
return _asyncToGenerator(function* () {
|
2217
|
-
var res;
|
2218
|
-
try {
|
2219
|
-
res = yield _this17.http.authedRequest(Method.Get, "/room_keys/version", undefined, undefined, {
|
2220
|
-
prefix: ClientPrefix.V3
|
2221
|
-
});
|
2222
|
-
} catch (e) {
|
2223
|
-
if (e.errcode === "M_NOT_FOUND") {
|
2224
|
-
return null;
|
2225
|
-
} else {
|
2226
|
-
throw e;
|
2227
|
-
}
|
2228
|
-
}
|
2229
|
-
BackupManager.checkBackupVersion(res);
|
2230
|
-
return res;
|
2231
|
-
})();
|
2232
|
-
}
|
2233
|
-
|
2234
|
-
/**
|
2235
|
-
* @param info - key backup info dict from getKeyBackupVersion()
|
2236
|
-
*
|
2237
|
-
* @deprecated Not supported for Rust Cryptography. Prefer {@link CryptoApi.isKeyBackupTrusted | `CryptoApi.isKeyBackupTrusted`}.
|
2238
|
-
*/
|
2239
|
-
isKeyBackupTrusted(info) {
|
2240
|
-
if (!this.crypto) {
|
2241
|
-
throw new Error("End-to-end encryption disabled");
|
2242
|
-
}
|
2243
|
-
return this.crypto.backupManager.isKeyBackupTrusted(info);
|
2244
|
-
}
|
2245
|
-
|
2246
|
-
/**
|
2247
|
-
* @returns true if the client is configured to back up keys to
|
2248
|
-
* the server, otherwise false. If we haven't completed a successful check
|
2249
|
-
* of key backup status yet, returns null.
|
2250
|
-
*
|
2251
|
-
* @deprecated Not supported for Rust Cryptography. Prefer direct access to {@link Crypto.CryptoApi.getActiveSessionBackupVersion}:
|
2252
|
-
*
|
2253
|
-
* ```javascript
|
2254
|
-
* let enabled = (await client.getCrypto().getActiveSessionBackupVersion()) !== null;
|
2255
|
-
* ```
|
2256
|
-
*/
|
2257
|
-
getKeyBackupEnabled() {
|
2258
|
-
if (!this.crypto) {
|
2259
|
-
throw new Error("End-to-end encryption disabled");
|
2260
|
-
}
|
2261
|
-
return this.crypto.backupManager.getKeyBackupEnabled();
|
2262
|
-
}
|
2263
|
-
|
2264
|
-
/**
|
2265
|
-
* Enable backing up of keys, using data previously returned from
|
2266
|
-
* getKeyBackupVersion.
|
2267
|
-
*
|
2268
|
-
* @param info - Backup information object as returned by getKeyBackupVersion
|
2269
|
-
* @returns Promise which resolves when complete.
|
2270
|
-
*
|
2271
|
-
* @deprecated Do not call this directly. Instead call {@link Crypto.CryptoApi.checkKeyBackupAndEnable}.
|
2272
|
-
*/
|
2273
|
-
enableKeyBackup(info) {
|
2274
|
-
if (!this.crypto) {
|
2275
|
-
throw new Error("End-to-end encryption disabled");
|
2276
|
-
}
|
2277
|
-
return this.crypto.backupManager.enableKeyBackup(info);
|
2278
|
-
}
|
2279
|
-
|
2280
|
-
/**
|
2281
|
-
* Disable backing up of keys.
|
2282
|
-
*
|
2283
|
-
* @deprecated Not supported for Rust Cryptography. It should be unnecessary to disable key backup.
|
2284
|
-
*/
|
2285
|
-
disableKeyBackup() {
|
2286
|
-
if (!this.crypto) {
|
2287
|
-
throw new Error("End-to-end encryption disabled");
|
2288
|
-
}
|
2289
|
-
this.crypto.backupManager.disableKeyBackup();
|
2290
|
-
}
|
2291
|
-
|
2292
|
-
/**
|
2293
|
-
* Set up the data required to create a new backup version. The backup version
|
2294
|
-
* will not be created and enabled until createKeyBackupVersion is called.
|
2295
|
-
*
|
2296
|
-
* @param password - Passphrase string that can be entered by the user
|
2297
|
-
* when restoring the backup as an alternative to entering the recovery key.
|
2298
|
-
* Optional.
|
2299
|
-
*
|
2300
|
-
* @returns Object that can be passed to createKeyBackupVersion and
|
2301
|
-
* additionally has a 'recovery_key' member with the user-facing recovery key string.
|
2302
|
-
*
|
2303
|
-
* @deprecated Not supported for Rust cryptography. Use {@link Crypto.CryptoApi.resetKeyBackup | `CryptoApi.resetKeyBackup`}.
|
2304
|
-
*/
|
2305
|
-
prepareKeyBackupVersion(password) {
|
2306
|
-
var _arguments2 = arguments,
|
2307
|
-
_this18 = this;
|
2308
|
-
return _asyncToGenerator(function* () {
|
2309
|
-
var opts = _arguments2.length > 1 && _arguments2[1] !== undefined ? _arguments2[1] : {
|
2310
|
-
secureSecretStorage: false
|
2311
|
-
};
|
2312
|
-
if (!_this18.crypto) {
|
2313
|
-
throw new Error("End-to-end encryption disabled");
|
2314
|
-
}
|
2315
|
-
|
2316
|
-
// eslint-disable-next-line camelcase
|
2317
|
-
var {
|
2318
|
-
algorithm,
|
2319
|
-
auth_data,
|
2320
|
-
recovery_key,
|
2321
|
-
privateKey
|
2322
|
-
} = yield _this18.crypto.backupManager.prepareKeyBackupVersion(password);
|
2323
|
-
if (opts.secureSecretStorage) {
|
2324
|
-
yield _this18.secretStorage.store("m.megolm_backup.v1", encodeBase64(privateKey));
|
2325
|
-
_this18.logger.info("Key backup private key stored in secret storage");
|
2326
|
-
}
|
2327
|
-
return {
|
2328
|
-
algorithm,
|
2329
|
-
/* eslint-disable camelcase */
|
2330
|
-
auth_data,
|
2331
|
-
recovery_key
|
2332
|
-
/* eslint-enable camelcase */
|
2333
|
-
};
|
2334
|
-
})();
|
2335
|
-
}
|
2336
|
-
|
2337
|
-
/**
|
2338
|
-
* Check whether the key backup private key is stored in secret storage.
|
2339
|
-
* @returns map of key name to key info the secret is
|
2340
|
-
* encrypted with, or null if it is not present or not encrypted with a
|
2341
|
-
* trusted key
|
2342
|
-
*/
|
2343
|
-
isKeyBackupKeyStored() {
|
2344
|
-
return Promise.resolve(this.secretStorage.isStored("m.megolm_backup.v1"));
|
2345
|
-
}
|
2346
|
-
|
2347
|
-
/**
|
2348
|
-
* Create a new key backup version and enable it, using the information return
|
2349
|
-
* from prepareKeyBackupVersion.
|
2350
|
-
*
|
2351
|
-
* @param info - Info object from prepareKeyBackupVersion
|
2352
|
-
* @returns Object with 'version' param indicating the version created
|
2353
|
-
*
|
2354
|
-
* @deprecated Use {@link Crypto.CryptoApi.resetKeyBackup | `CryptoApi.resetKeyBackup`}.
|
2355
|
-
*/
|
2356
|
-
createKeyBackupVersion(info) {
|
2357
|
-
var _this19 = this;
|
2358
|
-
return _asyncToGenerator(function* () {
|
2359
|
-
if (!_this19.crypto) {
|
2360
|
-
throw new Error("End-to-end encryption disabled");
|
2361
|
-
}
|
2362
|
-
yield _this19.crypto.backupManager.createKeyBackupVersion(info);
|
2363
|
-
var data = {
|
2364
|
-
algorithm: info.algorithm,
|
2365
|
-
auth_data: info.auth_data
|
2366
|
-
};
|
2367
|
-
|
2368
|
-
// Sign the backup auth data with the device key for backwards compat with
|
2369
|
-
// older devices with cross-signing. This can probably go away very soon in
|
2370
|
-
// favour of just signing with the cross-singing master key.
|
2371
|
-
// XXX: Private member access
|
2372
|
-
yield _this19.crypto.signObject(data.auth_data);
|
2373
|
-
if (_this19.cryptoCallbacks.getCrossSigningKey &&
|
2374
|
-
// XXX: Private member access
|
2375
|
-
_this19.crypto.crossSigningInfo.getId()) {
|
2376
|
-
// now also sign the auth data with the cross-signing master key
|
2377
|
-
// we check for the callback explicitly here because we still want to be able
|
2378
|
-
// to create an un-cross-signed key backup if there is a cross-signing key but
|
2379
|
-
// no callback supplied.
|
2380
|
-
// XXX: Private member access
|
2381
|
-
yield _this19.crypto.crossSigningInfo.signObject(data.auth_data, "master");
|
2382
|
-
}
|
2383
|
-
var res = yield _this19.http.authedRequest(Method.Post, "/room_keys/version", undefined, data);
|
2384
|
-
|
2385
|
-
// We could assume everything's okay and enable directly, but this ensures
|
2386
|
-
// we run the same signature verification that will be used for future
|
2387
|
-
// sessions.
|
2388
|
-
yield _this19.checkKeyBackup();
|
2389
|
-
if (!_this19.getKeyBackupEnabled()) {
|
2390
|
-
_this19.logger.error("Key backup not usable even though we just created it");
|
2391
|
-
}
|
2392
|
-
return res;
|
2393
|
-
})();
|
2394
|
-
}
|
2395
|
-
|
2396
|
-
/**
|
2397
|
-
* @deprecated Use {@link Crypto.CryptoApi.deleteKeyBackupVersion | `CryptoApi.deleteKeyBackupVersion`}.
|
2398
|
-
*/
|
2399
|
-
deleteKeyBackupVersion(version) {
|
2400
|
-
var _this20 = this;
|
2401
|
-
return _asyncToGenerator(function* () {
|
2402
|
-
if (!_this20.cryptoBackend) {
|
2403
|
-
throw new Error("End-to-end encryption disabled");
|
2404
|
-
}
|
2405
|
-
yield _this20.cryptoBackend.deleteKeyBackupVersion(version);
|
2406
|
-
})();
|
2407
|
-
}
|
2408
|
-
makeKeyBackupPath(roomId, sessionId, version) {
|
2409
|
-
var path;
|
2410
|
-
if (sessionId !== undefined) {
|
2411
|
-
path = utils.encodeUri("/room_keys/keys/$roomId/$sessionId", {
|
2412
|
-
$roomId: roomId,
|
2413
|
-
$sessionId: sessionId
|
2414
|
-
});
|
2415
|
-
} else if (roomId !== undefined) {
|
2416
|
-
path = utils.encodeUri("/room_keys/keys/$roomId", {
|
2417
|
-
$roomId: roomId
|
2418
|
-
});
|
2419
|
-
} else {
|
2420
|
-
path = "/room_keys/keys";
|
2421
|
-
}
|
2422
|
-
var queryData = version === undefined ? undefined : {
|
2423
|
-
version
|
2424
|
-
};
|
2425
|
-
return {
|
2426
|
-
path,
|
2427
|
-
queryData
|
2428
|
-
};
|
2429
|
-
}
|
2430
|
-
|
2431
|
-
/**
|
2432
|
-
* Back up session keys to the homeserver.
|
2433
|
-
* @param roomId - ID of the room that the keys are for Optional.
|
2434
|
-
* @param sessionId - ID of the session that the keys are for Optional.
|
2435
|
-
* @param version - backup version Optional.
|
2436
|
-
* @param data - Object keys to send
|
2437
|
-
* @returns a promise that will resolve when the keys
|
2438
|
-
* are uploaded
|
2439
|
-
*
|
2440
|
-
* @deprecated Not supported for Rust Cryptography.
|
2441
|
-
*/
|
2442
|
-
|
2443
|
-
sendKeyBackup(roomId, sessionId, version, data) {
|
2444
|
-
var _this21 = this;
|
2445
|
-
return _asyncToGenerator(function* () {
|
2446
|
-
if (!_this21.crypto) {
|
2447
|
-
throw new Error("End-to-end encryption disabled");
|
2448
|
-
}
|
2449
|
-
var path = _this21.makeKeyBackupPath(roomId, sessionId, version);
|
2450
|
-
yield _this21.http.authedRequest(Method.Put, path.path, path.queryData, data, {
|
2451
|
-
prefix: ClientPrefix.V3
|
2452
|
-
});
|
2453
|
-
})();
|
2454
|
-
}
|
2455
|
-
|
2456
|
-
/**
|
2457
|
-
* Marks all group sessions as needing to be backed up and schedules them to
|
2458
|
-
* upload in the background as soon as possible.
|
2459
|
-
*
|
2460
|
-
* @deprecated Not supported for Rust Cryptography. This is done automatically as part of
|
2461
|
-
* {@link CryptoApi.resetKeyBackup}, so there is probably no need to call this manually.
|
2462
|
-
*/
|
2463
|
-
scheduleAllGroupSessionsForBackup() {
|
2464
|
-
var _this22 = this;
|
2465
|
-
return _asyncToGenerator(function* () {
|
2466
|
-
if (!_this22.crypto) {
|
2467
|
-
throw new Error("End-to-end encryption disabled");
|
2468
|
-
}
|
2469
|
-
yield _this22.crypto.backupManager.scheduleAllGroupSessionsForBackup();
|
2470
|
-
})();
|
2471
|
-
}
|
2472
|
-
|
2473
|
-
/**
|
2474
|
-
* Marks all group sessions as needing to be backed up without scheduling
|
2475
|
-
* them to upload in the background.
|
2476
|
-
*
|
2477
|
-
* (This is done automatically as part of {@link CryptoApi.resetKeyBackup},
|
2478
|
-
* so there is probably no need to call this manually.)
|
2479
|
-
*
|
2480
|
-
* @returns Promise which resolves to the number of sessions requiring a backup.
|
2481
|
-
* @deprecated Not supported for Rust Cryptography.
|
2482
|
-
*/
|
2483
|
-
flagAllGroupSessionsForBackup() {
|
2484
|
-
if (!this.crypto) {
|
2485
|
-
throw new Error("End-to-end encryption disabled");
|
2486
|
-
}
|
2487
|
-
return this.crypto.backupManager.flagAllGroupSessionsForBackup();
|
2488
|
-
}
|
2489
|
-
|
2490
|
-
/**
|
2491
|
-
* Return true if recovery key is valid.
|
2492
|
-
* Try to decode the recovery key and check if it's successful.
|
2493
|
-
* @param recoveryKey
|
2494
|
-
* @deprecated Use {@link decodeRecoveryKey} directly
|
2495
|
-
*/
|
2496
|
-
isValidRecoveryKey(recoveryKey) {
|
2497
|
-
try {
|
2498
|
-
decodeRecoveryKey(recoveryKey);
|
2499
|
-
return true;
|
2500
|
-
} catch (_unused2) {
|
2501
|
-
return false;
|
2502
|
-
}
|
2503
|
-
}
|
2504
|
-
|
2505
|
-
/**
|
2506
|
-
* Get the raw key for a key backup from the password
|
2507
|
-
* Used when migrating key backups into SSSS
|
2508
|
-
*
|
2509
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
2510
|
-
*
|
2511
|
-
* @param password - Passphrase
|
2512
|
-
* @param backupInfo - Backup metadata from `checkKeyBackup`
|
2513
|
-
* @returns key backup key
|
2514
|
-
* @deprecated Deriving a backup key from a passphrase is not part of the matrix spec. Instead, a random key is generated and stored/shared via 4S.
|
2515
|
-
*/
|
2516
|
-
keyBackupKeyFromPassword(password, backupInfo) {
|
2517
|
-
return keyFromAuthData(backupInfo.auth_data, password);
|
2518
|
-
}
|
2519
|
-
|
2520
|
-
/**
|
2521
|
-
* Get the raw key for a key backup from the recovery key
|
2522
|
-
* Used when migrating key backups into SSSS
|
2523
|
-
*
|
2524
|
-
* The cross-signing API is currently UNSTABLE and may change without notice.
|
2525
|
-
*
|
2526
|
-
* @param recoveryKey - The recovery key
|
2527
|
-
* @returns key backup key
|
2528
|
-
* @deprecated Use {@link decodeRecoveryKey} directly
|
2529
|
-
*/
|
2530
|
-
keyBackupKeyFromRecoveryKey(recoveryKey) {
|
2531
|
-
return decodeRecoveryKey(recoveryKey);
|
2532
|
-
}
|
2533
|
-
|
2534
|
-
/**
|
2535
|
-
* Restore from an existing key backup via a passphrase.
|
2536
|
-
*
|
2537
|
-
* @param password - Passphrase
|
2538
|
-
* @param targetRoomId - Room ID to target a specific room.
|
2539
|
-
* Restores all rooms if omitted.
|
2540
|
-
* @param targetSessionId - Session ID to target a specific session.
|
2541
|
-
* Restores all sessions if omitted.
|
2542
|
-
* @param backupInfo - Backup metadata from `getKeyBackupVersion` or `checkKeyBackup`.`backupInfo`
|
2543
|
-
* @param opts - Optional params such as callbacks
|
2544
|
-
* @returns Status of restoration with `total` and `imported`
|
2545
|
-
* key counts.
|
2546
|
-
*
|
2547
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
|
2548
|
-
*/
|
2549
|
-
|
2550
|
-
/**
|
2551
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
|
2552
|
-
*/
|
2553
|
-
|
2554
|
-
/**
|
2555
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
|
2556
|
-
*/
|
2557
|
-
|
2558
|
-
/**
|
2559
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackupWithPassphrase | `CryptoApi.restoreKeyBackupWithPassphrase`}.
|
2560
|
-
*/
|
2561
|
-
restoreKeyBackupWithPassword(password, targetRoomId, targetSessionId, backupInfo, opts) {
|
2562
|
-
var _this23 = this;
|
2563
|
-
return _asyncToGenerator(function* () {
|
2564
|
-
var privKey = yield keyFromAuthData(backupInfo.auth_data, password);
|
2565
|
-
return _this23.restoreKeyBackup(privKey, targetRoomId, targetSessionId, backupInfo, opts);
|
2566
|
-
})();
|
2567
|
-
}
|
2568
|
-
|
2569
|
-
/**
|
2570
|
-
* Restore from an existing key backup via a private key stored in secret
|
2571
|
-
* storage.
|
2572
|
-
*
|
2573
|
-
* @param backupInfo - Backup metadata from `checkKeyBackup`
|
2574
|
-
* @param targetRoomId - Room ID to target a specific room.
|
2575
|
-
* Restores all rooms if omitted.
|
2576
|
-
* @param targetSessionId - Session ID to target a specific session.
|
2577
|
-
* Restores all sessions if omitted.
|
2578
|
-
* @param opts - Optional params such as callbacks
|
2579
|
-
* @returns Status of restoration with `total` and `imported`
|
2580
|
-
* key counts.
|
2581
|
-
*
|
2582
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2583
|
-
*/
|
2584
|
-
restoreKeyBackupWithSecretStorage(backupInfo, targetRoomId, targetSessionId, opts) {
|
2585
|
-
var _this24 = this;
|
2586
|
-
return _asyncToGenerator(function* () {
|
2587
|
-
if (!_this24.cryptoBackend) {
|
2588
|
-
throw new Error("End-to-end encryption disabled");
|
2589
|
-
}
|
2590
|
-
var storedKey = yield _this24.secretStorage.get("m.megolm_backup.v1");
|
2591
|
-
|
2592
|
-
// ensure that the key is in the right format. If not, fix the key and
|
2593
|
-
// store the fixed version
|
2594
|
-
var fixedKey = fixBackupKey(storedKey);
|
2595
|
-
if (fixedKey) {
|
2596
|
-
var keys = yield _this24.secretStorage.getKey();
|
2597
|
-
yield _this24.secretStorage.store("m.megolm_backup.v1", fixedKey, [keys[0]]);
|
2598
|
-
}
|
2599
|
-
var privKey = decodeBase64(fixedKey || storedKey);
|
2600
|
-
return _this24.restoreKeyBackup(privKey, targetRoomId, targetSessionId, backupInfo, opts);
|
2601
|
-
})();
|
2602
|
-
}
|
2603
|
-
|
2604
|
-
/**
|
2605
|
-
* Restore from an existing key backup via an encoded recovery key.
|
2606
|
-
*
|
2607
|
-
* @param recoveryKey - Encoded recovery key
|
2608
|
-
* @param targetRoomId - Room ID to target a specific room.
|
2609
|
-
* Restores all rooms if omitted.
|
2610
|
-
* @param targetSessionId - Session ID to target a specific session.
|
2611
|
-
* Restores all sessions if omitted.
|
2612
|
-
* @param backupInfo - Backup metadata from `checkKeyBackup`
|
2613
|
-
* @param opts - Optional params such as callbacks
|
2614
|
-
* @returns Status of restoration with `total` and `imported`
|
2615
|
-
* key counts.
|
2616
|
-
*
|
2617
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2618
|
-
*/
|
2619
|
-
|
2620
|
-
/**
|
2621
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2622
|
-
*/
|
2623
|
-
|
2624
|
-
/**
|
2625
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2626
|
-
*/
|
2627
|
-
|
2628
|
-
/**
|
2629
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2630
|
-
*/
|
2631
|
-
restoreKeyBackupWithRecoveryKey(recoveryKey, targetRoomId, targetSessionId, backupInfo, opts) {
|
2632
|
-
var privKey = decodeRecoveryKey(recoveryKey);
|
2633
|
-
return this.restoreKeyBackup(privKey, targetRoomId, targetSessionId, backupInfo, opts);
|
2634
|
-
}
|
2635
|
-
|
2636
|
-
/**
|
2637
|
-
* Restore from an existing key backup via a private key stored locally
|
2638
|
-
* @param targetRoomId
|
2639
|
-
* @param targetSessionId
|
2640
|
-
* @param backupInfo
|
2641
|
-
* @param opts
|
2642
|
-
*
|
2643
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2644
|
-
*/
|
2645
|
-
|
2646
|
-
/**
|
2647
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2648
|
-
*/
|
2649
|
-
|
2650
|
-
/**
|
2651
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2652
|
-
*/
|
2653
|
-
|
2654
|
-
/**
|
2655
|
-
* @deprecated Prefer {@link CryptoApi.restoreKeyBackup | `CryptoApi.restoreKeyBackup`}.
|
2656
|
-
*/
|
2657
|
-
restoreKeyBackupWithCache(targetRoomId, targetSessionId, backupInfo, opts) {
|
2658
|
-
var _this25 = this;
|
2659
|
-
return _asyncToGenerator(function* () {
|
2660
|
-
if (!_this25.cryptoBackend) {
|
2661
|
-
throw new Error("End-to-end encryption disabled");
|
2662
|
-
}
|
2663
|
-
var privKey = yield _this25.cryptoBackend.getSessionBackupPrivateKey();
|
2664
|
-
if (!privKey) {
|
2665
|
-
throw new Error("Couldn't get key");
|
2666
|
-
}
|
2667
|
-
return _this25.restoreKeyBackup(privKey, targetRoomId, targetSessionId, backupInfo, opts);
|
2668
|
-
})();
|
2669
|
-
}
|
2670
|
-
restoreKeyBackup(privKey, targetRoomId, targetSessionId, backupInfo, opts) {
|
2671
|
-
var _this26 = this;
|
2672
|
-
return _asyncToGenerator(function* () {
|
2673
|
-
var cacheCompleteCallback = opts === null || opts === void 0 ? void 0 : opts.cacheCompleteCallback;
|
2674
|
-
var progressCallback = opts === null || opts === void 0 ? void 0 : opts.progressCallback;
|
2675
|
-
if (!_this26.cryptoBackend) {
|
2676
|
-
throw new Error("End-to-end encryption disabled");
|
2677
|
-
}
|
2678
|
-
if (!backupInfo.version) {
|
2679
|
-
throw new Error("Backup version must be defined");
|
2680
|
-
}
|
2681
|
-
var backupVersion = backupInfo.version;
|
2682
|
-
var totalKeyCount = 0;
|
2683
|
-
var totalFailures = 0;
|
2684
|
-
var totalImported = 0;
|
2685
|
-
var path = _this26.makeKeyBackupPath(targetRoomId, targetSessionId, backupVersion);
|
2686
|
-
var backupDecryptor = yield _this26.cryptoBackend.getBackupDecryptor(backupInfo, privKey);
|
2687
|
-
var untrusted = !backupDecryptor.sourceTrusted;
|
2688
|
-
try {
|
2689
|
-
if (!(privKey instanceof Uint8Array)) {
|
2690
|
-
// eslint-disable-next-line @typescript-eslint/no-base-to-string
|
2691
|
-
throw new Error("restoreKeyBackup expects Uint8Array, got ".concat(privKey));
|
2692
|
-
}
|
2693
|
-
// Cache the key, if possible.
|
2694
|
-
// This is async.
|
2695
|
-
_this26.cryptoBackend.storeSessionBackupPrivateKey(privKey, backupVersion).catch(e => {
|
2696
|
-
_this26.logger.warn("Error caching session backup key:", e);
|
2697
|
-
}).then(cacheCompleteCallback);
|
2698
|
-
if (progressCallback) {
|
2699
|
-
progressCallback({
|
2700
|
-
stage: "fetch"
|
2701
|
-
});
|
2702
|
-
}
|
2703
|
-
var res = yield _this26.http.authedRequest(Method.Get, path.path, path.queryData, undefined, {
|
2704
|
-
prefix: ClientPrefix.V3
|
2705
|
-
});
|
2706
|
-
|
2707
|
-
// We have finished fetching the backup, go to next step
|
2708
|
-
if (progressCallback) {
|
2709
|
-
progressCallback({
|
2710
|
-
stage: "load_keys"
|
2711
|
-
});
|
2712
|
-
}
|
2713
|
-
if (res.rooms) {
|
2714
|
-
// We have a full backup here, it can get quite big, so we need to decrypt and import it in chunks.
|
2715
|
-
|
2716
|
-
// Get the total count as a first pass
|
2717
|
-
totalKeyCount = _this26.getTotalKeyCount(res);
|
2718
|
-
// Now decrypt and import the keys in chunks
|
2719
|
-
yield _this26.handleDecryptionOfAFullBackup(res, backupDecryptor, 200, /*#__PURE__*/function () {
|
2720
|
-
var _ref3 = _asyncToGenerator(function* (chunk) {
|
2721
|
-
// We have a chunk of decrypted keys: import them
|
2722
|
-
try {
|
2723
|
-
var _backupVersion = backupInfo.version;
|
2724
|
-
yield _this26.cryptoBackend.importBackedUpRoomKeys(chunk, _backupVersion, {
|
2725
|
-
untrusted
|
2726
|
-
});
|
2727
|
-
totalImported += chunk.length;
|
2728
|
-
} catch (e) {
|
2729
|
-
totalFailures += chunk.length;
|
2730
|
-
// We failed to import some keys, but we should still try to import the rest?
|
2731
|
-
// Log the error and continue
|
2732
|
-
logger.error("Error importing keys from backup", e);
|
2733
|
-
}
|
2734
|
-
if (progressCallback) {
|
2735
|
-
progressCallback({
|
2736
|
-
total: totalKeyCount,
|
2737
|
-
successes: totalImported,
|
2738
|
-
stage: "load_keys",
|
2739
|
-
failures: totalFailures
|
2740
|
-
});
|
2741
|
-
}
|
2742
|
-
});
|
2743
|
-
return function (_x2) {
|
2744
|
-
return _ref3.apply(this, arguments);
|
2745
|
-
};
|
2746
|
-
}());
|
2747
|
-
} else if (res.sessions) {
|
2748
|
-
// For now we don't chunk for a single room backup, but we could in the future.
|
2749
|
-
// Currently it is not used by the application.
|
2750
|
-
var sessions = res.sessions;
|
2751
|
-
totalKeyCount = Object.keys(sessions).length;
|
2752
|
-
var keys = yield backupDecryptor.decryptSessions(sessions);
|
2753
|
-
for (var _k of keys) {
|
2754
|
-
_k.room_id = targetRoomId;
|
2755
|
-
}
|
2756
|
-
yield _this26.cryptoBackend.importBackedUpRoomKeys(keys, backupVersion, {
|
2757
|
-
progressCallback,
|
2758
|
-
untrusted
|
2759
|
-
});
|
2760
|
-
totalImported = keys.length;
|
2761
|
-
} else {
|
2762
|
-
totalKeyCount = 1;
|
2763
|
-
try {
|
2764
|
-
var [_key2] = yield backupDecryptor.decryptSessions({
|
2765
|
-
[targetSessionId]: res
|
2766
|
-
});
|
2767
|
-
_key2.room_id = targetRoomId;
|
2768
|
-
_key2.session_id = targetSessionId;
|
2769
|
-
yield _this26.cryptoBackend.importBackedUpRoomKeys([_key2], backupVersion, {
|
2770
|
-
progressCallback,
|
2771
|
-
untrusted
|
2772
|
-
});
|
2773
|
-
totalImported = 1;
|
2774
|
-
} catch (e) {
|
2775
|
-
_this26.logger.debug("Failed to decrypt megolm session from backup", e);
|
2776
|
-
}
|
2777
|
-
}
|
2778
|
-
} finally {
|
2779
|
-
backupDecryptor.free();
|
2780
|
-
}
|
2781
|
-
|
2782
|
-
/// in case entering the passphrase would add a new signature?
|
2783
|
-
yield _this26.cryptoBackend.checkKeyBackupAndEnable();
|
2784
|
-
return {
|
2785
|
-
total: totalKeyCount,
|
2786
|
-
imported: totalImported
|
2787
|
-
};
|
2788
|
-
})();
|
2789
|
-
}
|
2790
|
-
|
2791
|
-
/**
|
2792
|
-
* This method calculates the total number of keys present in the response of a `/room_keys/keys` call.
|
2793
|
-
*
|
2794
|
-
* @param res - The response from the server containing the keys to be counted.
|
2795
|
-
*
|
2796
|
-
* @returns The total number of keys in the backup.
|
2797
|
-
*/
|
2798
|
-
getTotalKeyCount(res) {
|
2799
|
-
var rooms = res.rooms;
|
2800
|
-
var totalKeyCount = 0;
|
2801
|
-
for (var roomData of Object.values(rooms)) {
|
2802
|
-
if (!roomData.sessions) continue;
|
2803
|
-
totalKeyCount += Object.keys(roomData.sessions).length;
|
2804
|
-
}
|
2805
|
-
return totalKeyCount;
|
2806
|
-
}
|
2807
|
-
|
2808
|
-
/**
|
2809
|
-
* This method handles the decryption of a full backup, i.e a call to `/room_keys/keys`.
|
2810
|
-
* It will decrypt the keys in chunks and call the `block` callback for each chunk.
|
2811
|
-
*
|
2812
|
-
* @param res - The response from the server containing the keys to be decrypted.
|
2813
|
-
* @param backupDecryptor - An instance of the BackupDecryptor class used to decrypt the keys.
|
2814
|
-
* @param chunkSize - The size of the chunks to be processed at a time.
|
2815
|
-
* @param block - A callback function that is called for each chunk of keys.
|
2816
|
-
*
|
2817
|
-
* @returns A promise that resolves when the decryption is complete.
|
2818
|
-
*/
|
2819
|
-
handleDecryptionOfAFullBackup(res, backupDecryptor, chunkSize, block) {
|
2820
|
-
return _asyncToGenerator(function* () {
|
2821
|
-
var rooms = res.rooms;
|
2822
|
-
var groupChunkCount = 0;
|
2823
|
-
var chunkGroupByRoom = new Map();
|
2824
|
-
var handleChunkCallback = /*#__PURE__*/function () {
|
2825
|
-
var _ref4 = _asyncToGenerator(function* (roomChunks) {
|
2826
|
-
var currentChunk = [];
|
2827
|
-
for (var _roomId of roomChunks.keys()) {
|
2828
|
-
var decryptedSessions = yield backupDecryptor.decryptSessions(roomChunks.get(_roomId));
|
2829
|
-
for (var _sessionId in decryptedSessions) {
|
2830
|
-
var _k2 = decryptedSessions[_sessionId];
|
2831
|
-
_k2.room_id = _roomId;
|
2832
|
-
currentChunk.push(_k2);
|
2833
|
-
}
|
2834
|
-
}
|
2835
|
-
yield block(currentChunk);
|
2836
|
-
});
|
2837
|
-
return function handleChunkCallback(_x3) {
|
2838
|
-
return _ref4.apply(this, arguments);
|
2839
|
-
};
|
2840
|
-
}();
|
2841
|
-
for (var [_roomId2, roomData] of Object.entries(rooms)) {
|
2842
|
-
if (!roomData.sessions) continue;
|
2843
|
-
chunkGroupByRoom.set(_roomId2, {});
|
2844
|
-
for (var [_sessionId2, session] of Object.entries(roomData.sessions)) {
|
2845
|
-
var sessionsForRoom = chunkGroupByRoom.get(_roomId2);
|
2846
|
-
sessionsForRoom[_sessionId2] = session;
|
2847
|
-
groupChunkCount += 1;
|
2848
|
-
if (groupChunkCount >= chunkSize) {
|
2849
|
-
// We have enough chunks to decrypt
|
2850
|
-
yield handleChunkCallback(chunkGroupByRoom);
|
2851
|
-
chunkGroupByRoom = new Map();
|
2852
|
-
// There might be remaining keys for that room, so add back an entry for the current room.
|
2853
|
-
chunkGroupByRoom.set(_roomId2, {});
|
2854
|
-
groupChunkCount = 0;
|
2855
|
-
}
|
2856
|
-
}
|
2857
|
-
}
|
2858
|
-
|
2859
|
-
// Handle remaining chunk if needed
|
2860
|
-
if (groupChunkCount > 0) {
|
2861
|
-
yield handleChunkCallback(chunkGroupByRoom);
|
2862
|
-
}
|
2863
|
-
})();
|
591
|
+
* Fetches the latest capabilities from the homeserver, ignoring any cached
|
592
|
+
* versions. The newly returned version is cached.
|
593
|
+
*
|
594
|
+
* @returns A promise which resolves to the capabilities of the homeserver
|
595
|
+
*/
|
596
|
+
fetchCapabilities() {
|
597
|
+
return this.serverCapabilitiesService.fetchCapabilities();
|
2864
598
|
}
|
2865
|
-
|
2866
|
-
|
599
|
+
|
600
|
+
/**
|
601
|
+
* @deprecated Does nothing.
|
602
|
+
*/
|
603
|
+
uploadKeys() {
|
604
|
+
var _this4 = this;
|
2867
605
|
return _asyncToGenerator(function* () {
|
2868
|
-
|
2869
|
-
yield _this27.http.authedRequest(Method.Delete, path.path, path.queryData, undefined, {
|
2870
|
-
prefix: ClientPrefix.V3
|
2871
|
-
});
|
606
|
+
_this4.logger.warn("MatrixClient.uploadKeys is deprecated");
|
2872
607
|
})();
|
2873
608
|
}
|
2874
609
|
|
@@ -2990,10 +725,10 @@ export class MatrixClient extends TypedEventEmitter {
|
|
2990
725
|
* @returns Rejects: with an error response.
|
2991
726
|
*/
|
2992
727
|
getAccountDataFromServer(eventType) {
|
2993
|
-
var
|
728
|
+
var _this5 = this;
|
2994
729
|
return _asyncToGenerator(function* () {
|
2995
|
-
if (
|
2996
|
-
var _event =
|
730
|
+
if (_this5.isInitialSyncComplete()) {
|
731
|
+
var _event = _this5.store.getAccountData(eventType);
|
2997
732
|
if (!_event) {
|
2998
733
|
return null;
|
2999
734
|
}
|
@@ -3002,11 +737,11 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3002
737
|
return _event.getContent();
|
3003
738
|
}
|
3004
739
|
var path = utils.encodeUri("/user/$userId/account_data/$type", {
|
3005
|
-
$userId:
|
740
|
+
$userId: _this5.credentials.userId,
|
3006
741
|
$type: eventType
|
3007
742
|
});
|
3008
743
|
try {
|
3009
|
-
return yield
|
744
|
+
return yield _this5.http.authedRequest(Method.Get, path);
|
3010
745
|
} catch (e) {
|
3011
746
|
var _data;
|
3012
747
|
if (((_data = e.data) === null || _data === void 0 ? void 0 : _data.errcode) === "M_NOT_FOUND") {
|
@@ -3017,22 +752,22 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3017
752
|
})();
|
3018
753
|
}
|
3019
754
|
deleteAccountData(eventType) {
|
3020
|
-
var
|
755
|
+
var _this6 = this;
|
3021
756
|
return _asyncToGenerator(function* () {
|
3022
|
-
var msc3391DeleteAccountDataServerSupport =
|
757
|
+
var msc3391DeleteAccountDataServerSupport = _this6.canSupport.get(Feature.AccountDataDeletion);
|
3023
758
|
// if deletion is not supported overwrite with empty content
|
3024
759
|
if (msc3391DeleteAccountDataServerSupport === ServerSupport.Unsupported) {
|
3025
|
-
yield
|
760
|
+
yield _this6.setAccountData(eventType, {});
|
3026
761
|
return;
|
3027
762
|
}
|
3028
763
|
var path = utils.encodeUri("/user/$userId/account_data/$type", {
|
3029
|
-
$userId:
|
764
|
+
$userId: _this6.getSafeUserId(),
|
3030
765
|
$type: eventType
|
3031
766
|
});
|
3032
767
|
var options = msc3391DeleteAccountDataServerSupport === ServerSupport.Unstable ? {
|
3033
768
|
prefix: "/_matrix/client/unstable/org.matrix.msc3391"
|
3034
769
|
} : undefined;
|
3035
|
-
return yield
|
770
|
+
return yield _this6.http.authedRequest(Method.Delete, path, undefined, undefined, options);
|
3036
771
|
})();
|
3037
772
|
}
|
3038
773
|
|
@@ -3041,8 +776,8 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3041
776
|
* @returns The array of users that are ignored (empty if none)
|
3042
777
|
*/
|
3043
778
|
getIgnoredUsers() {
|
3044
|
-
var event = this.getAccountData(
|
3045
|
-
if (!event
|
779
|
+
var event = this.getAccountData(EventType.IgnoredUserList);
|
780
|
+
if (!(event !== null && event !== void 0 && event.getContent()["ignored_users"])) return [];
|
3046
781
|
return Object.keys(event.getContent()["ignored_users"]);
|
3047
782
|
}
|
3048
783
|
|
@@ -3059,7 +794,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3059
794
|
userIds.forEach(u => {
|
3060
795
|
content.ignored_users[u] = {};
|
3061
796
|
});
|
3062
|
-
return this.setAccountData(
|
797
|
+
return this.setAccountData(EventType.IgnoredUserList, content);
|
3063
798
|
}
|
3064
799
|
|
3065
800
|
/**
|
@@ -3079,20 +814,20 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3079
814
|
* @returns Rejects: with an error response.
|
3080
815
|
*/
|
3081
816
|
joinRoom(roomIdOrAlias) {
|
3082
|
-
var
|
3083
|
-
|
817
|
+
var _arguments = arguments,
|
818
|
+
_this7 = this;
|
3084
819
|
return _asyncToGenerator(function* () {
|
3085
|
-
var opts =
|
820
|
+
var opts = _arguments.length > 1 && _arguments[1] !== undefined ? _arguments[1] : {};
|
3086
821
|
if (opts.syncRoom === undefined) {
|
3087
822
|
opts.syncRoom = true;
|
3088
823
|
}
|
3089
|
-
var room =
|
3090
|
-
if (room !== null && room !== void 0 && room.hasMembershipState(
|
824
|
+
var room = _this7.getRoom(roomIdOrAlias);
|
825
|
+
if (room !== null && room !== void 0 && room.hasMembershipState(_this7.credentials.userId, KnownMembership.Join)) return room;
|
3091
826
|
var signPromise = Promise.resolve();
|
3092
827
|
if (opts.inviteSignUrl) {
|
3093
828
|
var _url = new URL(opts.inviteSignUrl);
|
3094
|
-
_url.searchParams.set("mxid",
|
3095
|
-
signPromise =
|
829
|
+
_url.searchParams.set("mxid", _this7.credentials.userId);
|
830
|
+
signPromise = _this7.http.requestOtherUrl(Method.Post, _url);
|
3096
831
|
}
|
3097
832
|
var queryParams = {};
|
3098
833
|
if (opts.viaServers) {
|
@@ -3108,14 +843,14 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3108
843
|
var path = utils.encodeUri("/join/$roomid", {
|
3109
844
|
$roomid: roomIdOrAlias
|
3110
845
|
});
|
3111
|
-
var res = yield
|
846
|
+
var res = yield _this7.http.authedRequest(Method.Post, path, queryParams, data);
|
3112
847
|
var roomId = res.room_id;
|
3113
848
|
// In case we were originally given an alias, check the room cache again
|
3114
849
|
// with the resolved ID - this method is supposed to no-op if we already
|
3115
850
|
// were in the room, after all.
|
3116
|
-
var resolvedRoom =
|
3117
|
-
if (resolvedRoom !== null && resolvedRoom !== void 0 && resolvedRoom.hasMembershipState(
|
3118
|
-
var syncApi = new SyncApi(
|
851
|
+
var resolvedRoom = _this7.getRoom(roomId);
|
852
|
+
if (resolvedRoom !== null && resolvedRoom !== void 0 && resolvedRoom.hasMembershipState(_this7.credentials.userId, KnownMembership.Join)) return resolvedRoom;
|
853
|
+
var syncApi = new SyncApi(_this7, _this7.clientOpts, _this7.buildSyncApiOptions());
|
3119
854
|
var syncRoom = syncApi.createRoom(roomId);
|
3120
855
|
if (opts.syncRoom) {
|
3121
856
|
// v2 will do this for us
|
@@ -3285,17 +1020,17 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3285
1020
|
* @returns Rejects: with an error response.
|
3286
1021
|
*/
|
3287
1022
|
setPowerLevel(roomId, userId, powerLevel) {
|
3288
|
-
var
|
1023
|
+
var _this8 = this;
|
3289
1024
|
return _asyncToGenerator(function* () {
|
3290
1025
|
var _content;
|
3291
1026
|
var content;
|
3292
|
-
if (
|
3293
|
-
var
|
3294
|
-
content = (
|
1027
|
+
if (_this8.clientRunning && _this8.isInitialSyncComplete()) {
|
1028
|
+
var _this8$getRoom;
|
1029
|
+
content = (_this8$getRoom = _this8.getRoom(roomId)) === null || _this8$getRoom === void 0 || (_this8$getRoom = _this8$getRoom.currentState) === null || _this8$getRoom === void 0 || (_this8$getRoom = _this8$getRoom.getStateEvents(EventType.RoomPowerLevels, "")) === null || _this8$getRoom === void 0 ? void 0 : _this8$getRoom.getContent();
|
3295
1030
|
}
|
3296
1031
|
if (!content) {
|
3297
1032
|
try {
|
3298
|
-
content = yield
|
1033
|
+
content = yield _this8.getStateEvent(roomId, EventType.RoomPowerLevels, "");
|
3299
1034
|
} catch (e) {
|
3300
1035
|
// It is possible for a Matrix room to not have a power levels event
|
3301
1036
|
if (e instanceof MatrixError && e.errcode === "M_NOT_FOUND") {
|
@@ -3320,7 +1055,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3320
1055
|
content.users[user] = powerLevel;
|
3321
1056
|
}
|
3322
1057
|
}
|
3323
|
-
return
|
1058
|
+
return _this8.sendStateEvent(roomId, EventType.RoomPowerLevels, content, "");
|
3324
1059
|
})();
|
3325
1060
|
}
|
3326
1061
|
|
@@ -3330,9 +1065,9 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3330
1065
|
*/
|
3331
1066
|
// eslint-disable-next-line @typescript-eslint/naming-convention
|
3332
1067
|
unstable_createLiveBeacon(roomId, beaconInfoContent) {
|
3333
|
-
var
|
1068
|
+
var _this9 = this;
|
3334
1069
|
return _asyncToGenerator(function* () {
|
3335
|
-
return
|
1070
|
+
return _this9.unstable_setLiveBeacon(roomId, beaconInfoContent);
|
3336
1071
|
})();
|
3337
1072
|
}
|
3338
1073
|
|
@@ -3344,9 +1079,9 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3344
1079
|
*/
|
3345
1080
|
// eslint-disable-next-line @typescript-eslint/naming-convention
|
3346
1081
|
unstable_setLiveBeacon(roomId, beaconInfoContent) {
|
3347
|
-
var
|
1082
|
+
var _this10 = this;
|
3348
1083
|
return _asyncToGenerator(function* () {
|
3349
|
-
return
|
1084
|
+
return _this10.sendStateEvent(roomId, M_BEACON_INFO.name, beaconInfoContent, _this10.getUserId());
|
3350
1085
|
})();
|
3351
1086
|
}
|
3352
1087
|
sendEvent(roomId, threadIdOrEventType, eventTypeOrContent, contentOrTxnId, txnIdOrVoid) {
|
@@ -3494,44 +1229,34 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3494
1229
|
*/
|
3495
1230
|
|
3496
1231
|
encryptAndSendEvent(room, event, delayOpts) {
|
3497
|
-
var
|
1232
|
+
var _this11 = this;
|
3498
1233
|
return _asyncToGenerator(function* () {
|
3499
1234
|
if (delayOpts) {
|
3500
|
-
return
|
1235
|
+
return _this11.sendEventHttpRequest(event, delayOpts);
|
3501
1236
|
}
|
3502
1237
|
try {
|
3503
|
-
|
3504
|
-
_this34.eventsBeingEncrypted.add(event.getId());
|
3505
|
-
try {
|
3506
|
-
yield _this34.encryptEventIfNeeded(event, room !== null && room !== void 0 ? room : undefined);
|
3507
|
-
} finally {
|
3508
|
-
cancelled = !_this34.eventsBeingEncrypted.delete(event.getId());
|
3509
|
-
}
|
3510
|
-
if (cancelled) {
|
3511
|
-
// cancelled via MatrixClient::cancelPendingEvent
|
3512
|
-
return {};
|
3513
|
-
}
|
1238
|
+
_this11.eventsBeingEncrypted.add(event.getId());
|
3514
1239
|
|
3515
1240
|
// encryptEventIfNeeded may have updated the status from SENDING to ENCRYPTING. If so, we need
|
3516
1241
|
// to put it back.
|
3517
1242
|
if (event.status === EventStatus.ENCRYPTING) {
|
3518
|
-
|
1243
|
+
_this11.updatePendingEventStatus(room, event, EventStatus.SENDING);
|
3519
1244
|
}
|
3520
1245
|
var promise = null;
|
3521
|
-
if (
|
1246
|
+
if (_this11.scheduler) {
|
3522
1247
|
// if this returns a promise then the scheduler has control now and will
|
3523
1248
|
// resolve/reject when it is done. Internally, the scheduler will invoke
|
3524
1249
|
// processFn which is set to this._sendEventHttpRequest so the same code
|
3525
1250
|
// path is executed regardless.
|
3526
|
-
promise =
|
3527
|
-
if (promise &&
|
1251
|
+
promise = _this11.scheduler.queueEvent(event);
|
1252
|
+
if (promise && _this11.scheduler.getQueueForEvent(event).length > 1) {
|
3528
1253
|
// event is processed FIFO so if the length is 2 or more we know
|
3529
1254
|
// this event is stuck behind an earlier event.
|
3530
|
-
|
1255
|
+
_this11.updatePendingEventStatus(room, event, EventStatus.QUEUED);
|
3531
1256
|
}
|
3532
1257
|
}
|
3533
1258
|
if (!promise) {
|
3534
|
-
promise =
|
1259
|
+
promise = _this11.sendEventHttpRequest(event);
|
3535
1260
|
if (room) {
|
3536
1261
|
promise = promise.then(res => {
|
3537
1262
|
room.updatePendingEvent(event, EventStatus.SENT, res["event_id"]);
|
@@ -3541,15 +1266,15 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3541
1266
|
}
|
3542
1267
|
return yield promise;
|
3543
1268
|
} catch (err) {
|
3544
|
-
|
1269
|
+
_this11.logger.error("Error sending event", err);
|
3545
1270
|
try {
|
3546
1271
|
// set the error on the event before we update the status:
|
3547
1272
|
// updating the status emits the event, so the state should be
|
3548
1273
|
// consistent at that point.
|
3549
1274
|
event.error = err;
|
3550
|
-
|
1275
|
+
_this11.updatePendingEventStatus(room, event, EventStatus.NOT_SENT);
|
3551
1276
|
} catch (e) {
|
3552
|
-
|
1277
|
+
_this11.logger.error("Exception in error handler!", e);
|
3553
1278
|
}
|
3554
1279
|
if (err instanceof MatrixError) {
|
3555
1280
|
err.event = event;
|
@@ -3558,70 +1283,6 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3558
1283
|
}
|
3559
1284
|
})();
|
3560
1285
|
}
|
3561
|
-
encryptEventIfNeeded(event, room) {
|
3562
|
-
var _this35 = this;
|
3563
|
-
return _asyncToGenerator(function* () {
|
3564
|
-
// If the room is unknown, we cannot encrypt for it
|
3565
|
-
if (!room) return;
|
3566
|
-
if (!(yield _this35.shouldEncryptEventForRoom(event, room))) return;
|
3567
|
-
if (!_this35.cryptoBackend && _this35.usingExternalCrypto) {
|
3568
|
-
// The client has opted to allow sending messages to encrypted
|
3569
|
-
// rooms even if the room is encrypted, and we haven't set up
|
3570
|
-
// crypto. This is useful for users of matrix-org/pantalaimon
|
3571
|
-
return;
|
3572
|
-
}
|
3573
|
-
if (!_this35.cryptoBackend) {
|
3574
|
-
throw new Error("This room is configured to use encryption, but your client does not support encryption.");
|
3575
|
-
}
|
3576
|
-
_this35.updatePendingEventStatus(room, event, EventStatus.ENCRYPTING);
|
3577
|
-
yield _this35.cryptoBackend.encryptEvent(event, room);
|
3578
|
-
})();
|
3579
|
-
}
|
3580
|
-
|
3581
|
-
/**
|
3582
|
-
* Determine whether a given event should be encrypted when we send it to the given room.
|
3583
|
-
*
|
3584
|
-
* This takes into account event type and room configuration.
|
3585
|
-
*/
|
3586
|
-
shouldEncryptEventForRoom(event, room) {
|
3587
|
-
var _this36 = this;
|
3588
|
-
return _asyncToGenerator(function* () {
|
3589
|
-
var _this36$cryptoBackend;
|
3590
|
-
if (event.isEncrypted()) {
|
3591
|
-
// this event has already been encrypted; this happens if the
|
3592
|
-
// encryption step succeeded, but the send step failed on the first
|
3593
|
-
// attempt.
|
3594
|
-
return false;
|
3595
|
-
}
|
3596
|
-
if (event.getType() === EventType.Reaction) {
|
3597
|
-
// For reactions, there is a very little gained by encrypting the entire
|
3598
|
-
// event, as relation data is already kept in the clear. Event
|
3599
|
-
// encryption for a reaction effectively only obscures the event type,
|
3600
|
-
// but the purpose is still obvious from the relation data, so nothing
|
3601
|
-
// is really gained. It also causes quite a few problems, such as:
|
3602
|
-
// * triggers notifications via default push rules
|
3603
|
-
// * prevents server-side bundling for reactions
|
3604
|
-
// The reaction key / content / emoji value does warrant encrypting, but
|
3605
|
-
// this will be handled separately by encrypting just this value.
|
3606
|
-
// See https://github.com/matrix-org/matrix-doc/pull/1849#pullrequestreview-248763642
|
3607
|
-
return false;
|
3608
|
-
}
|
3609
|
-
if (event.isRedaction()) {
|
3610
|
-
// Redactions do not support encryption in the spec at this time.
|
3611
|
-
// Whilst it mostly worked in some clients, it wasn't compliant.
|
3612
|
-
return false;
|
3613
|
-
}
|
3614
|
-
|
3615
|
-
// If the room has an m.room.encryption event, we should encrypt.
|
3616
|
-
if (room.hasEncryptionStateEvent()) return true;
|
3617
|
-
|
3618
|
-
// If we have a crypto impl, and *it* thinks we should encrypt, then we should.
|
3619
|
-
if (yield (_this36$cryptoBackend = _this36.cryptoBackend) === null || _this36$cryptoBackend === void 0 ? void 0 : _this36$cryptoBackend.isEncryptionEnabledInRoom(room.roomId)) return true;
|
3620
|
-
|
3621
|
-
// Otherwise, no need to encrypt.
|
3622
|
-
return false;
|
3623
|
-
})();
|
3624
|
-
}
|
3625
1286
|
|
3626
1287
|
/**
|
3627
1288
|
* Returns the eventType that should be used taking encryption into account
|
@@ -3884,13 +1545,13 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3884
1545
|
*/
|
3885
1546
|
// eslint-disable-next-line
|
3886
1547
|
_unstable_sendDelayedEvent(roomId, delayOpts, threadId, eventType, content, txnId) {
|
3887
|
-
var
|
1548
|
+
var _this12 = this;
|
3888
1549
|
return _asyncToGenerator(function* () {
|
3889
|
-
if (!(yield
|
1550
|
+
if (!(yield _this12.doesServerSupportUnstableFeature(UNSTABLE_MSC4140_DELAYED_EVENTS))) {
|
3890
1551
|
throw Error("Server does not support the delayed events API");
|
3891
1552
|
}
|
3892
|
-
|
3893
|
-
return
|
1553
|
+
_this12.addThreadRelationIfNeeded(content, threadId, roomId);
|
1554
|
+
return _this12.sendCompleteEvent(roomId, threadId, {
|
3894
1555
|
type: eventType,
|
3895
1556
|
content
|
3896
1557
|
}, delayOpts, txnId);
|
@@ -3905,12 +1566,12 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3905
1566
|
*/
|
3906
1567
|
// eslint-disable-next-line
|
3907
1568
|
_unstable_sendDelayedStateEvent(roomId, delayOpts, eventType, content) {
|
3908
|
-
var
|
3909
|
-
|
1569
|
+
var _arguments2 = arguments,
|
1570
|
+
_this13 = this;
|
3910
1571
|
return _asyncToGenerator(function* () {
|
3911
|
-
var stateKey =
|
3912
|
-
var opts =
|
3913
|
-
if (!(yield
|
1572
|
+
var stateKey = _arguments2.length > 4 && _arguments2[4] !== undefined ? _arguments2[4] : "";
|
1573
|
+
var opts = _arguments2.length > 5 && _arguments2[5] !== undefined ? _arguments2[5] : {};
|
1574
|
+
if (!(yield _this13.doesServerSupportUnstableFeature(UNSTABLE_MSC4140_DELAYED_EVENTS))) {
|
3914
1575
|
throw Error("Server does not support the delayed events API");
|
3915
1576
|
}
|
3916
1577
|
var pathParams = {
|
@@ -3922,7 +1583,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3922
1583
|
if (stateKey !== undefined) {
|
3923
1584
|
path = utils.encodeUri(path + "/$stateKey", pathParams);
|
3924
1585
|
}
|
3925
|
-
return
|
1586
|
+
return _this13.http.authedRequest(Method.Put, path, getUnstableDelayQueryOpts(delayOpts), content, opts);
|
3926
1587
|
})();
|
3927
1588
|
}
|
3928
1589
|
|
@@ -3934,15 +1595,15 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3934
1595
|
*/
|
3935
1596
|
// eslint-disable-next-line
|
3936
1597
|
_unstable_getDelayedEvents(fromToken) {
|
3937
|
-
var
|
1598
|
+
var _this14 = this;
|
3938
1599
|
return _asyncToGenerator(function* () {
|
3939
|
-
if (!(yield
|
1600
|
+
if (!(yield _this14.doesServerSupportUnstableFeature(UNSTABLE_MSC4140_DELAYED_EVENTS))) {
|
3940
1601
|
throw Error("Server does not support the delayed events API");
|
3941
1602
|
}
|
3942
1603
|
var queryDict = fromToken ? {
|
3943
1604
|
from: fromToken
|
3944
1605
|
} : undefined;
|
3945
|
-
return yield
|
1606
|
+
return yield _this14.http.authedRequest(Method.Get, "/delayed_events", queryDict, undefined, {
|
3946
1607
|
prefix: "".concat(ClientPrefix.Unstable, "/").concat(UNSTABLE_MSC4140_DELAYED_EVENTS)
|
3947
1608
|
});
|
3948
1609
|
})();
|
@@ -3956,9 +1617,9 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3956
1617
|
*/
|
3957
1618
|
// eslint-disable-next-line
|
3958
1619
|
_unstable_updateDelayedEvent(delayId, action) {
|
3959
|
-
var
|
1620
|
+
var _this15 = this;
|
3960
1621
|
return _asyncToGenerator(function* () {
|
3961
|
-
if (!(yield
|
1622
|
+
if (!(yield _this15.doesServerSupportUnstableFeature(UNSTABLE_MSC4140_DELAYED_EVENTS))) {
|
3962
1623
|
throw Error("Server does not support the delayed events API");
|
3963
1624
|
}
|
3964
1625
|
var path = utils.encodeUri("/delayed_events/$delayId", {
|
@@ -3967,7 +1628,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3967
1628
|
var data = {
|
3968
1629
|
action
|
3969
1630
|
};
|
3970
|
-
return yield
|
1631
|
+
return yield _this15.http.authedRequest(Method.Post, path, undefined, data, {
|
3971
1632
|
prefix: "".concat(ClientPrefix.Unstable, "/").concat(UNSTABLE_MSC4140_DELAYED_EVENTS)
|
3972
1633
|
});
|
3973
1634
|
})();
|
@@ -3984,11 +1645,11 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3984
1645
|
* @returns Rejects: with an error response.
|
3985
1646
|
*/
|
3986
1647
|
sendReceipt(event, receiptType, body) {
|
3987
|
-
var
|
3988
|
-
|
1648
|
+
var _arguments3 = arguments,
|
1649
|
+
_this16 = this;
|
3989
1650
|
return _asyncToGenerator(function* () {
|
3990
|
-
var unthreaded =
|
3991
|
-
if (
|
1651
|
+
var unthreaded = _arguments3.length > 3 && _arguments3[3] !== undefined ? _arguments3[3] : false;
|
1652
|
+
if (_this16.isGuest()) {
|
3992
1653
|
return Promise.resolve({}); // guests cannot send receipts so don't bother.
|
3993
1654
|
}
|
3994
1655
|
var path = utils.encodeUri("/rooms/$roomId/receipt/$receiptType/$eventId", {
|
@@ -3999,14 +1660,14 @@ export class MatrixClient extends TypedEventEmitter {
|
|
3999
1660
|
|
4000
1661
|
// Unless we're explicitly making an unthreaded receipt or we don't
|
4001
1662
|
// support threads, include the `thread_id` property in the body.
|
4002
|
-
var shouldAddThreadId = !unthreaded &&
|
1663
|
+
var shouldAddThreadId = !unthreaded && _this16.supportsThreads();
|
4003
1664
|
var fullBody = shouldAddThreadId ? _objectSpread(_objectSpread({}, body), {}, {
|
4004
1665
|
thread_id: threadIdForReceipt(event)
|
4005
1666
|
}) : body;
|
4006
|
-
var promise =
|
4007
|
-
var room =
|
4008
|
-
if (room &&
|
4009
|
-
room.addLocalEchoReceipt(
|
1667
|
+
var promise = _this16.http.authedRequest(Method.Post, path, undefined, fullBody || {});
|
1668
|
+
var room = _this16.getRoom(event.getRoomId());
|
1669
|
+
if (room && _this16.credentials.userId) {
|
1670
|
+
room.addLocalEchoReceipt(_this16.credentials.userId, event, receiptType, unthreaded);
|
4010
1671
|
}
|
4011
1672
|
return promise;
|
4012
1673
|
})();
|
@@ -4020,18 +1681,18 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4020
1681
|
* @returns Rejects: with an error response.
|
4021
1682
|
*/
|
4022
1683
|
sendReadReceipt(event) {
|
4023
|
-
var
|
4024
|
-
|
1684
|
+
var _arguments4 = arguments,
|
1685
|
+
_this17 = this;
|
4025
1686
|
return _asyncToGenerator(function* () {
|
4026
|
-
var receiptType =
|
4027
|
-
var unthreaded =
|
1687
|
+
var receiptType = _arguments4.length > 1 && _arguments4[1] !== undefined ? _arguments4[1] : ReceiptType.Read;
|
1688
|
+
var unthreaded = _arguments4.length > 2 && _arguments4[2] !== undefined ? _arguments4[2] : false;
|
4028
1689
|
if (!event) return;
|
4029
1690
|
var eventId = event.getId();
|
4030
|
-
var room =
|
1691
|
+
var room = _this17.getRoom(event.getRoomId());
|
4031
1692
|
if (room !== null && room !== void 0 && room.hasPendingEvent(eventId)) {
|
4032
1693
|
throw new Error("Cannot set read receipt to a pending event (".concat(eventId, ")"));
|
4033
1694
|
}
|
4034
|
-
return
|
1695
|
+
return _this17.sendReceipt(event, receiptType, {}, unthreaded);
|
4035
1696
|
})();
|
4036
1697
|
}
|
4037
1698
|
|
@@ -4050,9 +1711,9 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4050
1711
|
* @returns Promise which resolves: the empty object, `{}`.
|
4051
1712
|
*/
|
4052
1713
|
setRoomReadMarkers(roomId, rmEventId, rrEvent, rpEvent) {
|
4053
|
-
var
|
1714
|
+
var _this18 = this;
|
4054
1715
|
return _asyncToGenerator(function* () {
|
4055
|
-
var room =
|
1716
|
+
var room = _this18.getRoom(roomId);
|
4056
1717
|
if (room !== null && room !== void 0 && room.hasPendingEvent(rmEventId)) {
|
4057
1718
|
throw new Error("Cannot set read marker to a pending event (".concat(rmEventId, ")"));
|
4058
1719
|
}
|
@@ -4064,7 +1725,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4064
1725
|
if (room !== null && room !== void 0 && room.hasPendingEvent(rrEventId)) {
|
4065
1726
|
throw new Error("Cannot set read receipt to a pending event (".concat(rrEventId, ")"));
|
4066
1727
|
}
|
4067
|
-
room === null || room === void 0 || room.addLocalEchoReceipt(
|
1728
|
+
room === null || room === void 0 || room.addLocalEchoReceipt(_this18.credentials.userId, rrEvent, ReceiptType.Read);
|
4068
1729
|
}
|
4069
1730
|
|
4070
1731
|
// Add the optional private RR update, do local echo like `sendReceipt`
|
@@ -4074,9 +1735,9 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4074
1735
|
if (room !== null && room !== void 0 && room.hasPendingEvent(rpEventId)) {
|
4075
1736
|
throw new Error("Cannot set read receipt to a pending event (".concat(rpEventId, ")"));
|
4076
1737
|
}
|
4077
|
-
room === null || room === void 0 || room.addLocalEchoReceipt(
|
1738
|
+
room === null || room === void 0 || room.addLocalEchoReceipt(_this18.credentials.userId, rpEvent, ReceiptType.ReadPrivate);
|
4078
1739
|
}
|
4079
|
-
return yield
|
1740
|
+
return yield _this18.setRoomReadMarkersHttpRequest(roomId, rmEventId, rrEventId, rpEventId);
|
4080
1741
|
})();
|
4081
1742
|
}
|
4082
1743
|
|
@@ -4260,13 +1921,13 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4260
1921
|
* @returns Rejects: with an error response.
|
4261
1922
|
*/
|
4262
1923
|
inviteByThreePid(roomId, medium, address) {
|
4263
|
-
var
|
1924
|
+
var _this19 = this;
|
4264
1925
|
return _asyncToGenerator(function* () {
|
4265
|
-
var
|
1926
|
+
var _this19$identityServe;
|
4266
1927
|
var path = utils.encodeUri("/rooms/$roomId/invite", {
|
4267
1928
|
$roomId: roomId
|
4268
1929
|
});
|
4269
|
-
var identityServerUrl =
|
1930
|
+
var identityServerUrl = _this19.getIdentityServerUrl(true);
|
4270
1931
|
if (!identityServerUrl) {
|
4271
1932
|
return Promise.reject(new MatrixError({
|
4272
1933
|
error: "No supplied identity server URL",
|
@@ -4278,13 +1939,13 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4278
1939
|
medium: medium,
|
4279
1940
|
address: address
|
4280
1941
|
};
|
4281
|
-
if ((
|
4282
|
-
var identityAccessToken = yield
|
1942
|
+
if ((_this19$identityServe = _this19.identityServer) !== null && _this19$identityServe !== void 0 && _this19$identityServe.getAccessToken) {
|
1943
|
+
var identityAccessToken = yield _this19.identityServer.getAccessToken();
|
4283
1944
|
if (identityAccessToken) {
|
4284
1945
|
params["id_access_token"] = identityAccessToken;
|
4285
1946
|
}
|
4286
1947
|
}
|
4287
|
-
return
|
1948
|
+
return _this19.http.authedRequest(Method.Post, path, undefined, params);
|
4288
1949
|
})();
|
4289
1950
|
}
|
4290
1951
|
|
@@ -4352,18 +2013,18 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4352
2013
|
* @returns Rejects: with an error response.
|
4353
2014
|
*/
|
4354
2015
|
forget(roomId) {
|
4355
|
-
var
|
4356
|
-
|
2016
|
+
var _arguments5 = arguments,
|
2017
|
+
_this20 = this;
|
4357
2018
|
return _asyncToGenerator(function* () {
|
4358
|
-
var deleteRoom =
|
2019
|
+
var deleteRoom = _arguments5.length > 1 && _arguments5[1] !== undefined ? _arguments5[1] : true;
|
4359
2020
|
// API returns an empty object
|
4360
2021
|
var path = utils.encodeUri("/rooms/$room_id/forget", {
|
4361
2022
|
$room_id: roomId
|
4362
2023
|
});
|
4363
|
-
var response = yield
|
2024
|
+
var response = yield _this20.http.authedRequest(Method.Post, path);
|
4364
2025
|
if (deleteRoom) {
|
4365
|
-
|
4366
|
-
|
2026
|
+
_this20.store.removeRoom(roomId);
|
2027
|
+
_this20.emit(ClientEvent.DeleteRoom, roomId);
|
4367
2028
|
}
|
4368
2029
|
return response;
|
4369
2030
|
})();
|
@@ -4477,13 +2138,13 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4477
2138
|
* @returns Rejects: with an error response.
|
4478
2139
|
*/
|
4479
2140
|
setDisplayName(name) {
|
4480
|
-
var
|
2141
|
+
var _this21 = this;
|
4481
2142
|
return _asyncToGenerator(function* () {
|
4482
|
-
var prom = yield
|
2143
|
+
var prom = yield _this21.setProfileInfo("displayname", {
|
4483
2144
|
displayname: name
|
4484
2145
|
});
|
4485
2146
|
// XXX: synthesise a profile update for ourselves because Synapse is broken and won't
|
4486
|
-
var user =
|
2147
|
+
var user = _this21.getUser(_this21.getUserId());
|
4487
2148
|
if (user) {
|
4488
2149
|
user.displayName = name;
|
4489
2150
|
user.emit(UserEvent.DisplayName, user.events.presence, user);
|
@@ -4497,13 +2158,13 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4497
2158
|
* @returns Rejects: with an error response.
|
4498
2159
|
*/
|
4499
2160
|
setAvatarUrl(url) {
|
4500
|
-
var
|
2161
|
+
var _this22 = this;
|
4501
2162
|
return _asyncToGenerator(function* () {
|
4502
|
-
var prom = yield
|
2163
|
+
var prom = yield _this22.setProfileInfo("avatar_url", {
|
4503
2164
|
avatar_url: url
|
4504
2165
|
});
|
4505
2166
|
// XXX: synthesise a profile update for ourselves because Synapse is broken and won't
|
4506
|
-
var user =
|
2167
|
+
var user = _this22.getUser(_this22.getUserId());
|
4507
2168
|
if (user) {
|
4508
2169
|
user.avatarUrl = url;
|
4509
2170
|
user.emit(UserEvent.AvatarUrl, user.events.presence, user);
|
@@ -4544,10 +2205,10 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4544
2205
|
* @param presence - the presence to specify to set_presence of sync calls
|
4545
2206
|
*/
|
4546
2207
|
setSyncPresence(presence) {
|
4547
|
-
var
|
2208
|
+
var _this23 = this;
|
4548
2209
|
return _asyncToGenerator(function* () {
|
4549
|
-
var
|
4550
|
-
(
|
2210
|
+
var _this23$syncApi;
|
2211
|
+
(_this23$syncApi = _this23.syncApi) === null || _this23$syncApi === void 0 || _this23$syncApi.setPresence(presence);
|
4551
2212
|
})();
|
4552
2213
|
}
|
4553
2214
|
|
@@ -4558,16 +2219,16 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4558
2219
|
* @throws If 'presence' isn't a valid presence enum value.
|
4559
2220
|
*/
|
4560
2221
|
setPresence(opts) {
|
4561
|
-
var
|
2222
|
+
var _this24 = this;
|
4562
2223
|
return _asyncToGenerator(function* () {
|
4563
2224
|
var path = utils.encodeUri("/presence/$userId/status", {
|
4564
|
-
$userId:
|
2225
|
+
$userId: _this24.credentials.userId
|
4565
2226
|
});
|
4566
2227
|
var validStates = ["offline", "online", "unavailable"];
|
4567
2228
|
if (validStates.indexOf(opts.presence) === -1) {
|
4568
2229
|
throw new Error("Bad presence value: " + opts.presence);
|
4569
2230
|
}
|
4570
|
-
yield
|
2231
|
+
yield _this24.http.authedRequest(Method.Put, path, undefined, opts);
|
4571
2232
|
})();
|
4572
2233
|
}
|
4573
2234
|
|
@@ -4634,7 +2295,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4634
2295
|
}
|
4635
2296
|
var [timelineEvents, threadedEvents, unknownRelations] = room.partitionThreadedEvents(matrixEvents);
|
4636
2297
|
this.processAggregatedTimelineEvents(room, timelineEvents);
|
4637
|
-
room.addEventsToTimeline(timelineEvents, true, room.getLiveTimeline());
|
2298
|
+
room.addEventsToTimeline(timelineEvents, true, true, room.getLiveTimeline());
|
4638
2299
|
this.processThreadEvents(room, threadedEvents, true);
|
4639
2300
|
unknownRelations.forEach(event => room.relations.aggregateChildEvent(event));
|
4640
2301
|
room.oldState.paginationToken = (_res$end = res.end) !== null && _res$end !== void 0 ? _res$end : null;
|
@@ -4676,11 +2337,11 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4676
2337
|
* {@link EventTimeline} including the given event
|
4677
2338
|
*/
|
4678
2339
|
getEventTimeline(timelineSet, eventId) {
|
4679
|
-
var
|
2340
|
+
var _this25 = this;
|
4680
2341
|
return _asyncToGenerator(function* () {
|
4681
|
-
var
|
2342
|
+
var _this25$clientOpts, _ref2, _timelineSet$getTimel, _timelineSet$room$fin;
|
4682
2343
|
// don't allow any timeline support unless it's been enabled.
|
4683
|
-
if (!
|
2344
|
+
if (!_this25.timelineSupport) {
|
4684
2345
|
throw new Error("timeline support is disabled. Set the 'timelineSupport'" + " parameter to true when creating MatrixClient to enable it.");
|
4685
2346
|
}
|
4686
2347
|
if (!(timelineSet !== null && timelineSet !== void 0 && timelineSet.room)) {
|
@@ -4689,22 +2350,22 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4689
2350
|
if (timelineSet.getTimelineForEvent(eventId)) {
|
4690
2351
|
return timelineSet.getTimelineForEvent(eventId);
|
4691
2352
|
}
|
4692
|
-
if (timelineSet.thread &&
|
4693
|
-
return
|
2353
|
+
if (timelineSet.thread && _this25.supportsThreads()) {
|
2354
|
+
return _this25.getThreadTimeline(timelineSet, eventId);
|
4694
2355
|
}
|
4695
2356
|
var path = utils.encodeUri("/rooms/$roomId/context/$eventId", {
|
4696
2357
|
$roomId: timelineSet.room.roomId,
|
4697
2358
|
$eventId: eventId
|
4698
2359
|
});
|
4699
2360
|
var params = undefined;
|
4700
|
-
if ((
|
2361
|
+
if ((_this25$clientOpts = _this25.clientOpts) !== null && _this25$clientOpts !== void 0 && _this25$clientOpts.lazyLoadMembers) {
|
4701
2362
|
params = {
|
4702
2363
|
filter: JSON.stringify(Filter.LAZY_LOADING_MESSAGES_FILTER)
|
4703
2364
|
};
|
4704
2365
|
}
|
4705
2366
|
|
4706
2367
|
// TODO: we should implement a backoff (as per scrollback()) to deal more nicely with HTTP errors.
|
4707
|
-
var res = yield
|
2368
|
+
var res = yield _this25.http.authedRequest(Method.Get, path, params);
|
4708
2369
|
if (!res.event) {
|
4709
2370
|
throw new Error("'event' not in '/context' result - homeserver too old?");
|
4710
2371
|
}
|
@@ -4713,10 +2374,10 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4713
2374
|
if (timelineSet.getTimelineForEvent(eventId)) {
|
4714
2375
|
return timelineSet.getTimelineForEvent(eventId);
|
4715
2376
|
}
|
4716
|
-
var mapper =
|
2377
|
+
var mapper = _this25.getEventMapper();
|
4717
2378
|
var event = mapper(res.event);
|
4718
2379
|
if (event.isRelation(THREAD_RELATION_TYPE.name)) {
|
4719
|
-
|
2380
|
+
_this25.logger.warn("Tried loading a regular timeline at the position of a thread event");
|
4720
2381
|
return undefined;
|
4721
2382
|
}
|
4722
2383
|
var events = [
|
@@ -4735,25 +2396,25 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4735
2396
|
timeline.getState(EventTimeline.FORWARDS).paginationToken = res.end;
|
4736
2397
|
}
|
4737
2398
|
var [timelineEvents, threadedEvents, unknownRelations] = timelineSet.room.partitionThreadedEvents(events);
|
4738
|
-
timelineSet.addEventsToTimeline(timelineEvents, true, timeline, res.start);
|
2399
|
+
timelineSet.addEventsToTimeline(timelineEvents, true, false, timeline, res.start);
|
4739
2400
|
// The target event is not in a thread but process the contextual events, so we can show any threads around it.
|
4740
|
-
|
4741
|
-
|
2401
|
+
_this25.processThreadEvents(timelineSet.room, threadedEvents, true);
|
2402
|
+
_this25.processAggregatedTimelineEvents(timelineSet.room, timelineEvents);
|
4742
2403
|
unknownRelations.forEach(event => timelineSet.relations.aggregateChildEvent(event));
|
4743
2404
|
|
4744
2405
|
// There is no guarantee that the event ended up in "timeline" (we might have switched to a neighbouring
|
4745
2406
|
// timeline) - so check the room's index again. On the other hand, there's no guarantee the event ended up
|
4746
2407
|
// anywhere, if it was later redacted, so we just return the timeline we first thought of.
|
4747
|
-
return (
|
2408
|
+
return (_ref2 = (_timelineSet$getTimel = timelineSet.getTimelineForEvent(eventId)) !== null && _timelineSet$getTimel !== void 0 ? _timelineSet$getTimel : (_timelineSet$room$fin = timelineSet.room.findThreadForEvent(event)) === null || _timelineSet$room$fin === void 0 ? void 0 : _timelineSet$room$fin.liveTimeline) !== null && _ref2 !== void 0 ? _ref2 :
|
4748
2409
|
// for Threads degraded support
|
4749
2410
|
timeline;
|
4750
2411
|
})();
|
4751
2412
|
}
|
4752
2413
|
getThreadTimeline(timelineSet, eventId) {
|
4753
|
-
var
|
2414
|
+
var _this26 = this;
|
4754
2415
|
return _asyncToGenerator(function* () {
|
4755
|
-
var
|
4756
|
-
if (!
|
2416
|
+
var _this26$clientOpts;
|
2417
|
+
if (!_this26.supportsThreads()) {
|
4757
2418
|
throw new Error("could not get thread timeline: no client support");
|
4758
2419
|
}
|
4759
2420
|
if (!timelineSet.room) {
|
@@ -4769,18 +2430,18 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4769
2430
|
var params = {
|
4770
2431
|
limit: "0"
|
4771
2432
|
};
|
4772
|
-
if ((
|
2433
|
+
if ((_this26$clientOpts = _this26.clientOpts) !== null && _this26$clientOpts !== void 0 && _this26$clientOpts.lazyLoadMembers) {
|
4773
2434
|
params.filter = JSON.stringify(Filter.LAZY_LOADING_MESSAGES_FILTER);
|
4774
2435
|
}
|
4775
2436
|
|
4776
2437
|
// TODO: we should implement a backoff (as per scrollback()) to deal more nicely with HTTP errors.
|
4777
|
-
var res = yield
|
4778
|
-
var mapper =
|
2438
|
+
var res = yield _this26.http.authedRequest(Method.Get, path, params);
|
2439
|
+
var mapper = _this26.getEventMapper();
|
4779
2440
|
var event = mapper(res.event);
|
4780
2441
|
if (!timelineSet.canContain(event)) {
|
4781
2442
|
return undefined;
|
4782
2443
|
}
|
4783
|
-
var recurse =
|
2444
|
+
var recurse = _this26.canSupport.get(Feature.RelationsRecursion) !== ServerSupport.Unsupported;
|
4784
2445
|
if (Thread.hasServerSideSupport) {
|
4785
2446
|
if (Thread.hasServerSideFwdPaginationSupport) {
|
4786
2447
|
var _resOlder$next_batch, _resNewer$next_batch, _timelineSet$getTimel2;
|
@@ -4788,12 +2449,12 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4788
2449
|
throw new Error("could not get thread timeline: not a thread timeline");
|
4789
2450
|
}
|
4790
2451
|
var thread = timelineSet.thread;
|
4791
|
-
var resOlder = yield
|
2452
|
+
var resOlder = yield _this26.fetchRelations(timelineSet.room.roomId, thread.id, null, null, {
|
4792
2453
|
dir: Direction.Backward,
|
4793
2454
|
from: res.start,
|
4794
2455
|
recurse: recurse || undefined
|
4795
2456
|
});
|
4796
|
-
var resNewer = yield
|
2457
|
+
var resNewer = yield _this26.fetchRelations(timelineSet.room.roomId, thread.id, null, null, {
|
4797
2458
|
dir: Direction.Forward,
|
4798
2459
|
from: res.end,
|
4799
2460
|
recurse: recurse || undefined
|
@@ -4816,14 +2477,14 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4816
2477
|
timeline = timelineSet.addTimeline();
|
4817
2478
|
timeline.initialiseState(res.state.map(mapper));
|
4818
2479
|
}
|
4819
|
-
timelineSet.addEventsToTimeline(events, true, timeline, resNewer.next_batch);
|
2480
|
+
timelineSet.addEventsToTimeline(events, true, false, timeline, resNewer.next_batch);
|
4820
2481
|
if (!resOlder.next_batch) {
|
4821
|
-
var originalEvent = yield
|
4822
|
-
timelineSet.addEventsToTimeline([mapper(originalEvent)], true, timeline, null);
|
2482
|
+
var originalEvent = yield _this26.fetchRoomEvent(timelineSet.room.roomId, thread.id);
|
2483
|
+
timelineSet.addEventsToTimeline([mapper(originalEvent)], true, false, timeline, null);
|
4823
2484
|
}
|
4824
2485
|
timeline.setPaginationToken((_resOlder$next_batch = resOlder.next_batch) !== null && _resOlder$next_batch !== void 0 ? _resOlder$next_batch : null, Direction.Backward);
|
4825
2486
|
timeline.setPaginationToken((_resNewer$next_batch = resNewer.next_batch) !== null && _resNewer$next_batch !== void 0 ? _resNewer$next_batch : null, Direction.Forward);
|
4826
|
-
|
2487
|
+
_this26.processAggregatedTimelineEvents(timelineSet.room, events);
|
4827
2488
|
|
4828
2489
|
// There is no guarantee that the event ended up in "timeline" (we might have switched to a neighbouring
|
4829
2490
|
// timeline) - so check the room's index again. On the other hand, there's no guarantee the event ended up
|
@@ -4836,7 +2497,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4836
2497
|
// XXX: workaround for https://github.com/vector-im/element-meta/issues/150
|
4837
2498
|
|
4838
2499
|
var _thread = timelineSet.thread;
|
4839
|
-
var _resOlder = yield
|
2500
|
+
var _resOlder = yield _this26.fetchRelations(timelineSet.room.roomId, _thread.id, THREAD_RELATION_TYPE.name, null, {
|
4840
2501
|
dir: Direction.Backward,
|
4841
2502
|
from: res.start,
|
4842
2503
|
recurse: recurse || undefined
|
@@ -4845,7 +2506,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4845
2506
|
var nextBatch = res.end;
|
4846
2507
|
while (nextBatch) {
|
4847
2508
|
var _resNewer$next_batch2;
|
4848
|
-
var _resNewer = yield
|
2509
|
+
var _resNewer = yield _this26.fetchRelations(timelineSet.room.roomId, _thread.id, THREAD_RELATION_TYPE.name, null, {
|
4849
2510
|
dir: Direction.Forward,
|
4850
2511
|
from: nextBatch,
|
4851
2512
|
recurse: recurse || undefined
|
@@ -4867,14 +2528,14 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4867
2528
|
// summaries.
|
4868
2529
|
var _timeline = timelineSet.getLiveTimeline();
|
4869
2530
|
_timeline.getState(EventTimeline.BACKWARDS).setUnknownStateEvents(res.state.map(mapper));
|
4870
|
-
timelineSet.addEventsToTimeline(_events, true, _timeline, null);
|
2531
|
+
timelineSet.addEventsToTimeline(_events, true, false, _timeline, null);
|
4871
2532
|
if (!_resOlder.next_batch) {
|
4872
|
-
var _originalEvent = yield
|
4873
|
-
timelineSet.addEventsToTimeline([mapper(_originalEvent)], true, _timeline, null);
|
2533
|
+
var _originalEvent = yield _this26.fetchRoomEvent(timelineSet.room.roomId, _thread.id);
|
2534
|
+
timelineSet.addEventsToTimeline([mapper(_originalEvent)], true, false, _timeline, null);
|
4874
2535
|
}
|
4875
2536
|
_timeline.setPaginationToken((_resOlder$next_batch2 = _resOlder.next_batch) !== null && _resOlder$next_batch2 !== void 0 ? _resOlder$next_batch2 : null, Direction.Backward);
|
4876
2537
|
_timeline.setPaginationToken(null, Direction.Forward);
|
4877
|
-
|
2538
|
+
_this26.processAggregatedTimelineEvents(timelineSet.room, _events);
|
4878
2539
|
return _timeline;
|
4879
2540
|
}
|
4880
2541
|
}
|
@@ -4892,10 +2553,10 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4892
2553
|
* {@link EventTimeline} timeline with the latest events in the room
|
4893
2554
|
*/
|
4894
2555
|
getLatestTimeline(timelineSet) {
|
4895
|
-
var
|
2556
|
+
var _this27 = this;
|
4896
2557
|
return _asyncToGenerator(function* () {
|
4897
2558
|
// don't allow any timeline support unless it's been enabled.
|
4898
|
-
if (!
|
2559
|
+
if (!_this27.timelineSupport) {
|
4899
2560
|
throw new Error("timeline support is disabled. Set the 'timelineSupport'" + " parameter to true when creating MatrixClient to enable it.");
|
4900
2561
|
}
|
4901
2562
|
if (!timelineSet.room) {
|
@@ -4904,35 +2565,35 @@ export class MatrixClient extends TypedEventEmitter {
|
|
4904
2565
|
var event;
|
4905
2566
|
if (timelineSet.threadListType !== null) {
|
4906
2567
|
var _res$chunk;
|
4907
|
-
var res = yield
|
2568
|
+
var res = yield _this27.createThreadListMessagesRequest(timelineSet.room.roomId, null, 1, Direction.Backward, timelineSet.threadListType, timelineSet.getFilter());
|
4908
2569
|
event = (_res$chunk = res.chunk) === null || _res$chunk === void 0 ? void 0 : _res$chunk[0];
|
4909
2570
|
} else if (timelineSet.thread && Thread.hasServerSideSupport) {
|
4910
2571
|
var _res$chunk2;
|
4911
|
-
var recurse =
|
4912
|
-
var _res = yield
|
2572
|
+
var recurse = _this27.canSupport.get(Feature.RelationsRecursion) !== ServerSupport.Unsupported;
|
2573
|
+
var _res = yield _this27.fetchRelations(timelineSet.room.roomId, timelineSet.thread.id, THREAD_RELATION_TYPE.name, null, {
|
4913
2574
|
dir: Direction.Backward,
|
4914
2575
|
limit: 1,
|
4915
2576
|
recurse: recurse || undefined
|
4916
2577
|
});
|
4917
2578
|
event = (_res$chunk2 = _res.chunk) === null || _res$chunk2 === void 0 ? void 0 : _res$chunk2[0];
|
4918
2579
|
} else {
|
4919
|
-
var
|
2580
|
+
var _this27$clientOpts, _res2$chunk;
|
4920
2581
|
var messagesPath = utils.encodeUri("/rooms/$roomId/messages", {
|
4921
2582
|
$roomId: timelineSet.room.roomId
|
4922
2583
|
});
|
4923
2584
|
var params = {
|
4924
2585
|
dir: "b"
|
4925
2586
|
};
|
4926
|
-
if ((
|
2587
|
+
if ((_this27$clientOpts = _this27.clientOpts) !== null && _this27$clientOpts !== void 0 && _this27$clientOpts.lazyLoadMembers) {
|
4927
2588
|
params.filter = JSON.stringify(Filter.LAZY_LOADING_MESSAGES_FILTER);
|
4928
2589
|
}
|
4929
|
-
var _res2 = yield
|
2590
|
+
var _res2 = yield _this27.http.authedRequest(Method.Get, messagesPath, params);
|
4930
2591
|
event = (_res2$chunk = _res2.chunk) === null || _res2$chunk === void 0 ? void 0 : _res2$chunk[0];
|
4931
2592
|
}
|
4932
2593
|
if (!event) {
|
4933
2594
|
throw new Error("No message returned when trying to construct getLatestTimeline");
|
4934
2595
|
}
|
4935
|
-
return
|
2596
|
+
return _this27.getEventTimeline(timelineSet, event.event_id);
|
4936
2597
|
})();
|
4937
2598
|
}
|
4938
2599
|
|
@@ -5044,7 +2705,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5044
2705
|
* events and we reached either end of the timeline; else true.
|
5045
2706
|
*/
|
5046
2707
|
paginateEventTimeline(eventTimeline, opts) {
|
5047
|
-
var
|
2708
|
+
var _this28 = this;
|
5048
2709
|
var isNotifTimeline = eventTimeline.getTimelineSet() === this.notifTimelineSet;
|
5049
2710
|
var room = this.getRoom(eventTimeline.getRoomId());
|
5050
2711
|
var threadListType = eventTimeline.getTimelineSet().threadListType;
|
@@ -5080,17 +2741,17 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5080
2741
|
params.from = token;
|
5081
2742
|
}
|
5082
2743
|
promise = this.http.authedRequest(Method.Get, path, params).then(/*#__PURE__*/function () {
|
5083
|
-
var
|
2744
|
+
var _ref3 = _asyncToGenerator(function* (res) {
|
5084
2745
|
var token = res.next_token;
|
5085
2746
|
var matrixEvents = [];
|
5086
2747
|
res.notifications = res.notifications.filter(noUnsafeEventProps);
|
5087
2748
|
for (var i = 0; i < res.notifications.length; i++) {
|
5088
2749
|
var notification = res.notifications[i];
|
5089
|
-
var _event4 =
|
2750
|
+
var _event4 = _this28.getEventMapper()(notification.event);
|
5090
2751
|
|
5091
2752
|
// @TODO(kerrya) reprocessing every notification is ugly
|
5092
2753
|
// remove if we get server MSC3994 support
|
5093
|
-
|
2754
|
+
_this28.getPushDetailsForEvent(_event4, true);
|
5094
2755
|
_event4.event.room_id = notification.room_id; // XXX: gutwrenching
|
5095
2756
|
matrixEvents[i] = _event4;
|
5096
2757
|
}
|
@@ -5098,8 +2759,8 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5098
2759
|
// No need to partition events for threads here, everything lives
|
5099
2760
|
// in the notification timeline set
|
5100
2761
|
var timelineSet = eventTimeline.getTimelineSet();
|
5101
|
-
timelineSet.addEventsToTimeline(matrixEvents, backwards, eventTimeline, token);
|
5102
|
-
|
2762
|
+
timelineSet.addEventsToTimeline(matrixEvents, backwards, false, eventTimeline, token);
|
2763
|
+
_this28.processAggregatedTimelineEvents(timelineSet.room, matrixEvents);
|
5103
2764
|
|
5104
2765
|
// if we've hit the end of the timeline, we need to stop trying to
|
5105
2766
|
// paginate. We need to keep the 'forwards' token though, to make sure
|
@@ -5109,8 +2770,8 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5109
2770
|
}
|
5110
2771
|
return Boolean(res.next_token);
|
5111
2772
|
});
|
5112
|
-
return function (
|
5113
|
-
return
|
2773
|
+
return function (_x2) {
|
2774
|
+
return _ref3.apply(this, arguments);
|
5114
2775
|
};
|
5115
2776
|
}()).finally(() => {
|
5116
2777
|
eventTimeline.paginationRequests[dir] = null;
|
@@ -5132,7 +2793,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5132
2793
|
var token = res.end;
|
5133
2794
|
var matrixEvents = res.chunk.filter(noUnsafeEventProps).map(this.getEventMapper());
|
5134
2795
|
var timelineSet = eventTimeline.getTimelineSet();
|
5135
|
-
timelineSet.addEventsToTimeline(matrixEvents, backwards, eventTimeline, token);
|
2796
|
+
timelineSet.addEventsToTimeline(matrixEvents, backwards, false, eventTimeline, token);
|
5136
2797
|
this.processAggregatedTimelineEvents(room, matrixEvents);
|
5137
2798
|
this.processThreadRoots(room, matrixEvents, backwards);
|
5138
2799
|
|
@@ -5160,8 +2821,8 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5160
2821
|
from: token !== null && token !== void 0 ? token : undefined,
|
5161
2822
|
recurse: recurse || undefined
|
5162
2823
|
}).then(/*#__PURE__*/function () {
|
5163
|
-
var
|
5164
|
-
var mapper =
|
2824
|
+
var _ref4 = _asyncToGenerator(function* (res) {
|
2825
|
+
var mapper = _this28.getEventMapper();
|
5165
2826
|
var matrixEvents = res.chunk.filter(noUnsafeEventProps).filter(getRelationsThreadFilter(thread.id)).map(mapper);
|
5166
2827
|
|
5167
2828
|
// Process latest events first
|
@@ -5174,13 +2835,13 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5174
2835
|
}
|
5175
2836
|
var newToken = res.next_batch;
|
5176
2837
|
var timelineSet = eventTimeline.getTimelineSet();
|
5177
|
-
timelineSet.addEventsToTimeline(matrixEvents, backwards, eventTimeline, newToken !== null && newToken !== void 0 ? newToken : null);
|
2838
|
+
timelineSet.addEventsToTimeline(matrixEvents, backwards, false, eventTimeline, newToken !== null && newToken !== void 0 ? newToken : null);
|
5178
2839
|
if (!newToken && backwards) {
|
5179
2840
|
var _thread$rootEvent, _eventTimeline$getRoo3;
|
5180
|
-
var originalEvent = (_thread$rootEvent = thread.rootEvent) !== null && _thread$rootEvent !== void 0 ? _thread$rootEvent : mapper(yield
|
5181
|
-
timelineSet.addEventsToTimeline([originalEvent], true, eventTimeline, null);
|
2841
|
+
var originalEvent = (_thread$rootEvent = thread.rootEvent) !== null && _thread$rootEvent !== void 0 ? _thread$rootEvent : mapper(yield _this28.fetchRoomEvent((_eventTimeline$getRoo3 = eventTimeline.getRoomId()) !== null && _eventTimeline$getRoo3 !== void 0 ? _eventTimeline$getRoo3 : "", thread.id));
|
2842
|
+
timelineSet.addEventsToTimeline([originalEvent], true, false, eventTimeline, null);
|
5182
2843
|
}
|
5183
|
-
|
2844
|
+
_this28.processAggregatedTimelineEvents(timelineSet.room, matrixEvents);
|
5184
2845
|
|
5185
2846
|
// if we've hit the end of the timeline, we need to stop trying to
|
5186
2847
|
// paginate. We need to keep the 'forwards' token though, to make sure
|
@@ -5190,8 +2851,8 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5190
2851
|
}
|
5191
2852
|
return Boolean(newToken);
|
5192
2853
|
});
|
5193
|
-
return function (
|
5194
|
-
return
|
2854
|
+
return function (_x3) {
|
2855
|
+
return _ref4.apply(this, arguments);
|
5195
2856
|
};
|
5196
2857
|
}()).finally(() => {
|
5197
2858
|
eventTimeline.paginationRequests[dir] = null;
|
@@ -5211,7 +2872,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5211
2872
|
var matrixEvents = res.chunk.filter(noUnsafeEventProps).map(this.getEventMapper());
|
5212
2873
|
var timelineSet = eventTimeline.getTimelineSet();
|
5213
2874
|
var [timelineEvents,, unknownRelations] = room.partitionThreadedEvents(matrixEvents);
|
5214
|
-
timelineSet.addEventsToTimeline(timelineEvents, backwards, eventTimeline, token);
|
2875
|
+
timelineSet.addEventsToTimeline(timelineEvents, backwards, false, eventTimeline, token);
|
5215
2876
|
this.processAggregatedTimelineEvents(room, timelineEvents);
|
5216
2877
|
this.processThreadRoots(room, timelineEvents.filter(it => it.getServerAggregatedRelation(THREAD_RELATION_TYPE.name)), false);
|
5217
2878
|
unknownRelations.forEach(event => room.relations.aggregateChildEvent(event));
|
@@ -5466,10 +3127,10 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5466
3127
|
* @returns Promise which resolves: As requestEmailToken
|
5467
3128
|
*/
|
5468
3129
|
requestTokenFromEndpoint(endpoint, params) {
|
5469
|
-
var
|
3130
|
+
var _this29 = this;
|
5470
3131
|
return _asyncToGenerator(function* () {
|
5471
3132
|
var postParams = Object.assign({}, params);
|
5472
|
-
return
|
3133
|
+
return _this29.http.request(Method.Post, endpoint, undefined, postParams);
|
5473
3134
|
})();
|
5474
3135
|
}
|
5475
3136
|
|
@@ -5678,8 +3339,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5678
3339
|
if (_room5) {
|
5679
3340
|
// Copy over a known event sender if we can
|
5680
3341
|
for (var ev of sr.context.getTimeline()) {
|
5681
|
-
|
5682
|
-
if (!ev.sender && sender) ev.sender = sender;
|
3342
|
+
ev.setMetadata(_room5.currentState, false);
|
5683
3343
|
}
|
5684
3344
|
}
|
5685
3345
|
searchResults.results.push(sr);
|
@@ -5764,14 +3424,14 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5764
3424
|
* @returns Filter ID
|
5765
3425
|
*/
|
5766
3426
|
getOrCreateFilter(filterName, filter) {
|
5767
|
-
var
|
3427
|
+
var _this30 = this;
|
5768
3428
|
return _asyncToGenerator(function* () {
|
5769
|
-
var filterId =
|
3429
|
+
var filterId = _this30.store.getFilterIdByName(filterName);
|
5770
3430
|
var existingId;
|
5771
3431
|
if (filterId) {
|
5772
3432
|
// check that the existing filter matches our expectations
|
5773
3433
|
try {
|
5774
|
-
var existingFilter = yield
|
3434
|
+
var existingFilter = yield _this30.getFilter(_this30.credentials.userId, filterId, true);
|
5775
3435
|
if (existingFilter) {
|
5776
3436
|
var oldDef = existingFilter.getDefinition();
|
5777
3437
|
var newDef = filter.getDefinition();
|
@@ -5795,7 +3455,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5795
3455
|
}
|
5796
3456
|
// if the filter doesn't exist anymore on the server, remove from store
|
5797
3457
|
if (!existingId) {
|
5798
|
-
|
3458
|
+
_this30.store.setFilterIdByName(filterName, undefined);
|
5799
3459
|
}
|
5800
3460
|
}
|
5801
3461
|
if (existingId) {
|
@@ -5803,8 +3463,8 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5803
3463
|
}
|
5804
3464
|
|
5805
3465
|
// create a new filter
|
5806
|
-
var createdFilter = yield
|
5807
|
-
|
3466
|
+
var createdFilter = yield _this30.createFilter(filter.getDefinition());
|
3467
|
+
_this30.store.setFilterIdByName(filterName, createdFilter.filterId);
|
5808
3468
|
return createdFilter.filterId;
|
5809
3469
|
})();
|
5810
3470
|
}
|
@@ -5822,84 +3482,6 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5822
3482
|
});
|
5823
3483
|
return this.http.authedRequest(Method.Post, path, undefined, {});
|
5824
3484
|
}
|
5825
|
-
/**
|
5826
|
-
* @returns Promise which resolves: ITurnServerResponse object
|
5827
|
-
* @returns Rejects: with an error response.
|
5828
|
-
*/
|
5829
|
-
turnServer() {
|
5830
|
-
return this.http.authedRequest(Method.Get, "/voip/turnServer");
|
5831
|
-
}
|
5832
|
-
|
5833
|
-
/**
|
5834
|
-
* Get the TURN servers for this homeserver.
|
5835
|
-
* @returns The servers or an empty list.
|
5836
|
-
*/
|
5837
|
-
getTurnServers() {
|
5838
|
-
return this.turnServers || [];
|
5839
|
-
}
|
5840
|
-
|
5841
|
-
/**
|
5842
|
-
* Get the unix timestamp (in milliseconds) at which the current
|
5843
|
-
* TURN credentials (from getTurnServers) expire
|
5844
|
-
* @returns The expiry timestamp in milliseconds
|
5845
|
-
*/
|
5846
|
-
getTurnServersExpiry() {
|
5847
|
-
return this.turnServersExpiry;
|
5848
|
-
}
|
5849
|
-
get pollingTurnServers() {
|
5850
|
-
return this.checkTurnServersIntervalID !== undefined;
|
5851
|
-
}
|
5852
|
-
|
5853
|
-
// XXX: Intended private, used in code.
|
5854
|
-
checkTurnServers() {
|
5855
|
-
var _this56 = this;
|
5856
|
-
return _asyncToGenerator(function* () {
|
5857
|
-
if (!_this56.canSupportVoip) {
|
5858
|
-
return;
|
5859
|
-
}
|
5860
|
-
var credentialsGood = false;
|
5861
|
-
var remainingTime = _this56.turnServersExpiry - Date.now();
|
5862
|
-
if (remainingTime > TURN_CHECK_INTERVAL) {
|
5863
|
-
_this56.logger.debug("TURN creds are valid for another " + remainingTime + " ms: not fetching new ones.");
|
5864
|
-
credentialsGood = true;
|
5865
|
-
} else {
|
5866
|
-
_this56.logger.debug("Fetching new TURN credentials");
|
5867
|
-
try {
|
5868
|
-
var res = yield _this56.turnServer();
|
5869
|
-
if (res.uris) {
|
5870
|
-
_this56.logger.debug("Got TURN URIs: " + res.uris + " refresh in " + res.ttl + " secs");
|
5871
|
-
// map the response to a format that can be fed to RTCPeerConnection
|
5872
|
-
var servers = {
|
5873
|
-
urls: res.uris,
|
5874
|
-
username: res.username,
|
5875
|
-
credential: res.password
|
5876
|
-
};
|
5877
|
-
_this56.turnServers = [servers];
|
5878
|
-
// The TTL is in seconds but we work in ms
|
5879
|
-
_this56.turnServersExpiry = Date.now() + res.ttl * 1000;
|
5880
|
-
credentialsGood = true;
|
5881
|
-
_this56.emit(ClientEvent.TurnServers, _this56.turnServers);
|
5882
|
-
}
|
5883
|
-
} catch (err) {
|
5884
|
-
_this56.logger.error("Failed to get TURN URIs", err);
|
5885
|
-
if (err.httpStatus === 403) {
|
5886
|
-
// We got a 403, so there's no point in looping forever.
|
5887
|
-
_this56.logger.info("TURN access unavailable for this account: stopping credentials checks");
|
5888
|
-
if (_this56.checkTurnServersIntervalID !== null) {
|
5889
|
-
globalThis.clearInterval(_this56.checkTurnServersIntervalID);
|
5890
|
-
}
|
5891
|
-
_this56.checkTurnServersIntervalID = undefined;
|
5892
|
-
_this56.emit(ClientEvent.TurnServersError, err, true); // fatal
|
5893
|
-
} else {
|
5894
|
-
// otherwise, if we failed for whatever reason, try again the next time we're called.
|
5895
|
-
_this56.emit(ClientEvent.TurnServersError, err, false); // non-fatal
|
5896
|
-
}
|
5897
|
-
}
|
5898
|
-
}
|
5899
|
-
return credentialsGood;
|
5900
|
-
})();
|
5901
|
-
}
|
5902
|
-
|
5903
3485
|
/**
|
5904
3486
|
* Set whether to allow a fallback ICE server should be used for negotiating a
|
5905
3487
|
* WebRTC connection if the homeserver doesn't provide any servers. Defaults to
|
@@ -5968,14 +3550,14 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5968
3550
|
});
|
5969
3551
|
}
|
5970
3552
|
fetchClientWellKnown() {
|
5971
|
-
var
|
3553
|
+
var _this31 = this;
|
5972
3554
|
return _asyncToGenerator(function* () {
|
5973
|
-
var
|
3555
|
+
var _this31$getDomain;
|
5974
3556
|
// `getRawClientConfig` does not throw or reject on network errors, instead
|
5975
3557
|
// it absorbs errors and returns `{}`.
|
5976
|
-
|
5977
|
-
|
5978
|
-
|
3558
|
+
_this31.clientWellKnownPromise = AutoDiscovery.getRawClientConfig((_this31$getDomain = _this31.getDomain()) !== null && _this31$getDomain !== void 0 ? _this31$getDomain : undefined);
|
3559
|
+
_this31.clientWellKnown = yield _this31.clientWellKnownPromise;
|
3560
|
+
_this31.emit(ClientEvent.ClientWellKnown, _this31.clientWellKnown);
|
5979
3561
|
})();
|
5980
3562
|
}
|
5981
3563
|
getClientWellKnown() {
|
@@ -5997,11 +3579,11 @@ export class MatrixClient extends TypedEventEmitter {
|
|
5997
3579
|
storeClientOptions() {
|
5998
3580
|
// XXX: Intended private, used in code
|
5999
3581
|
var primTypes = ["boolean", "string", "number"];
|
6000
|
-
var serializableOpts = Object.entries(this.clientOpts).filter(
|
6001
|
-
var [key, value] =
|
3582
|
+
var serializableOpts = Object.entries(this.clientOpts).filter(_ref5 => {
|
3583
|
+
var [key, value] = _ref5;
|
6002
3584
|
return primTypes.includes(typeof value);
|
6003
|
-
}).reduce((obj,
|
6004
|
-
var [key, value] =
|
3585
|
+
}).reduce((obj, _ref6) => {
|
3586
|
+
var [key, value] = _ref6;
|
6005
3587
|
obj[key] = value;
|
6006
3588
|
return obj;
|
6007
3589
|
}, {});
|
@@ -6021,16 +3603,16 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6021
3603
|
// TODO: on spec release, rename this to getMutualRooms
|
6022
3604
|
// eslint-disable-next-line
|
6023
3605
|
_unstable_getSharedRooms(userId) {
|
6024
|
-
var
|
3606
|
+
var _this32 = this;
|
6025
3607
|
return _asyncToGenerator(function* () {
|
6026
3608
|
// Initial variant of the MSC
|
6027
|
-
var sharedRoomsSupport = yield
|
3609
|
+
var sharedRoomsSupport = yield _this32.doesServerSupportUnstableFeature(UNSTABLE_MSC2666_SHARED_ROOMS);
|
6028
3610
|
|
6029
3611
|
// Newer variant that renamed shared rooms to mutual rooms
|
6030
|
-
var mutualRoomsSupport = yield
|
3612
|
+
var mutualRoomsSupport = yield _this32.doesServerSupportUnstableFeature(UNSTABLE_MSC2666_MUTUAL_ROOMS);
|
6031
3613
|
|
6032
3614
|
// Latest variant that changed from path elements to query elements
|
6033
|
-
var queryMutualRoomsSupport = yield
|
3615
|
+
var queryMutualRoomsSupport = yield _this32.doesServerSupportUnstableFeature(UNSTABLE_MSC2666_QUERY_MUTUAL_ROOMS);
|
6034
3616
|
if (!sharedRoomsSupport && !mutualRoomsSupport && !queryMutualRoomsSupport) {
|
6035
3617
|
throw Error("Server does not support the Mutual Rooms API");
|
6036
3618
|
}
|
@@ -6058,7 +3640,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6058
3640
|
if (token != null && queryMutualRoomsSupport) {
|
6059
3641
|
tokenQuery["batch_token"] = token;
|
6060
3642
|
}
|
6061
|
-
var res = yield
|
3643
|
+
var res = yield _this32.http.authedRequest(Method.Get, path, _objectSpread(_objectSpread({}, query), tokenQuery), undefined, {
|
6062
3644
|
prefix: ClientPrefix.Unstable
|
6063
3645
|
});
|
6064
3646
|
rooms.push(...res.joined);
|
@@ -6078,24 +3660,24 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6078
3660
|
* @returns The server /versions response
|
6079
3661
|
*/
|
6080
3662
|
getVersions() {
|
6081
|
-
var
|
3663
|
+
var _this33 = this;
|
6082
3664
|
return _asyncToGenerator(function* () {
|
6083
|
-
if (
|
6084
|
-
return
|
3665
|
+
if (_this33.serverVersionsPromise) {
|
3666
|
+
return _this33.serverVersionsPromise;
|
6085
3667
|
}
|
6086
3668
|
|
6087
3669
|
// We send an authenticated request as of MSC4026
|
6088
|
-
|
3670
|
+
_this33.serverVersionsPromise = _this33.http.authedRequest(Method.Get, "/_matrix/client/versions", undefined, undefined, {
|
6089
3671
|
prefix: ""
|
6090
3672
|
}).catch(e => {
|
6091
3673
|
// Need to unset this if it fails, otherwise we'll never retry
|
6092
|
-
|
3674
|
+
_this33.serverVersionsPromise = undefined;
|
6093
3675
|
// but rethrow the exception to anything that was waiting
|
6094
3676
|
throw e;
|
6095
3677
|
});
|
6096
|
-
var serverVersions = yield
|
6097
|
-
|
6098
|
-
return
|
3678
|
+
var serverVersions = yield _this33.serverVersionsPromise;
|
3679
|
+
_this33.canSupport = yield buildFeatureSupportMap(serverVersions);
|
3680
|
+
return _this33.serverVersionsPromise;
|
6099
3681
|
})();
|
6100
3682
|
}
|
6101
3683
|
|
@@ -6105,11 +3687,11 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6105
3687
|
* @returns Whether it is supported
|
6106
3688
|
*/
|
6107
3689
|
isVersionSupported(version) {
|
6108
|
-
var
|
3690
|
+
var _this34 = this;
|
6109
3691
|
return _asyncToGenerator(function* () {
|
6110
3692
|
var {
|
6111
3693
|
versions
|
6112
|
-
} = yield
|
3694
|
+
} = yield _this34.getVersions();
|
6113
3695
|
return versions && versions.includes(version);
|
6114
3696
|
})();
|
6115
3697
|
}
|
@@ -6121,9 +3703,9 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6121
3703
|
* @returns true if the feature is supported
|
6122
3704
|
*/
|
6123
3705
|
doesServerSupportUnstableFeature(feature) {
|
6124
|
-
var
|
3706
|
+
var _this35 = this;
|
6125
3707
|
return _asyncToGenerator(function* () {
|
6126
|
-
var response = yield
|
3708
|
+
var response = yield _this35.getVersions();
|
6127
3709
|
if (!response) return false;
|
6128
3710
|
var unstableFeatures = response["unstable_features"];
|
6129
3711
|
return unstableFeatures && !!unstableFeatures[feature];
|
@@ -6138,9 +3720,9 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6138
3720
|
* for the preset.
|
6139
3721
|
*/
|
6140
3722
|
doesServerForceEncryptionForPreset(presetName) {
|
6141
|
-
var
|
3723
|
+
var _this36 = this;
|
6142
3724
|
return _asyncToGenerator(function* () {
|
6143
|
-
var response = yield
|
3725
|
+
var response = yield _this36.getVersions();
|
6144
3726
|
if (!response) return false;
|
6145
3727
|
var unstableFeatures = response["unstable_features"];
|
6146
3728
|
|
@@ -6150,9 +3732,9 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6150
3732
|
})();
|
6151
3733
|
}
|
6152
3734
|
doesServerSupportThread() {
|
6153
|
-
var
|
3735
|
+
var _this37 = this;
|
6154
3736
|
return _asyncToGenerator(function* () {
|
6155
|
-
if (yield
|
3737
|
+
if (yield _this37.isVersionSupported("v1.4")) {
|
6156
3738
|
return {
|
6157
3739
|
threads: FeatureSupport.Stable,
|
6158
3740
|
list: FeatureSupport.Stable,
|
@@ -6160,13 +3742,13 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6160
3742
|
};
|
6161
3743
|
}
|
6162
3744
|
try {
|
6163
|
-
var [threadUnstable, threadStable, listUnstable, listStable, fwdPaginationUnstable, fwdPaginationStable] = yield Promise.all([
|
3745
|
+
var [threadUnstable, threadStable, listUnstable, listStable, fwdPaginationUnstable, fwdPaginationStable] = yield Promise.all([_this37.doesServerSupportUnstableFeature("org.matrix.msc3440"), _this37.doesServerSupportUnstableFeature("org.matrix.msc3440.stable"), _this37.doesServerSupportUnstableFeature("org.matrix.msc3856"), _this37.doesServerSupportUnstableFeature("org.matrix.msc3856.stable"), _this37.doesServerSupportUnstableFeature("org.matrix.msc3715"), _this37.doesServerSupportUnstableFeature("org.matrix.msc3715.stable")]);
|
6164
3746
|
return {
|
6165
3747
|
threads: determineFeatureSupport(threadStable, threadUnstable),
|
6166
3748
|
list: determineFeatureSupport(listStable, listUnstable),
|
6167
3749
|
fwdPagination: determineFeatureSupport(fwdPaginationStable, fwdPaginationUnstable)
|
6168
3750
|
};
|
6169
|
-
} catch (
|
3751
|
+
} catch (_unused) {
|
6170
3752
|
return {
|
6171
3753
|
threads: FeatureSupport.None,
|
6172
3754
|
list: FeatureSupport.None,
|
@@ -6218,21 +3800,19 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6218
3800
|
* @returns an object with `events` as `MatrixEvent[]` and optionally `nextBatch` if more relations are available.
|
6219
3801
|
*/
|
6220
3802
|
relations(roomId, eventId, relationType, eventType) {
|
6221
|
-
var
|
6222
|
-
|
3803
|
+
var _arguments6 = arguments,
|
3804
|
+
_this38 = this;
|
6223
3805
|
return _asyncToGenerator(function* () {
|
6224
3806
|
var _result$next_batch, _result$prev_batch;
|
6225
|
-
var opts =
|
3807
|
+
var opts = _arguments6.length > 4 && _arguments6[4] !== undefined ? _arguments6[4] : {
|
6226
3808
|
dir: Direction.Backward
|
6227
3809
|
};
|
6228
|
-
var fetchedEventType = eventType ?
|
6229
|
-
var [eventResult, result] = yield Promise.all([
|
6230
|
-
var mapper =
|
3810
|
+
var fetchedEventType = eventType ? _this38.getEncryptedIfNeededEventType(roomId, eventType) : null;
|
3811
|
+
var [eventResult, result] = yield Promise.all([_this38.fetchRoomEvent(roomId, eventId), _this38.fetchRelations(roomId, eventId, relationType, fetchedEventType, opts)]);
|
3812
|
+
var mapper = _this38.getEventMapper();
|
6231
3813
|
var originalEvent = eventResult ? mapper(eventResult) : undefined;
|
6232
3814
|
var events = result.chunk.map(mapper);
|
6233
3815
|
if (fetchedEventType === EventType.RoomMessageEncrypted) {
|
6234
|
-
var allEvents = originalEvent ? events.concat(originalEvent) : events;
|
6235
|
-
yield Promise.all(allEvents.map(e => _this64.decryptEventIfNeeded(e)));
|
6236
3816
|
if (eventType !== null) {
|
6237
3817
|
events = events.filter(e => e.getType() === eventType);
|
6238
3818
|
}
|
@@ -6249,25 +3829,13 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6249
3829
|
})();
|
6250
3830
|
}
|
6251
3831
|
|
6252
|
-
/**
|
6253
|
-
* The app may wish to see if we have a key cached without
|
6254
|
-
* triggering a user interaction.
|
6255
|
-
*
|
6256
|
-
* @deprecated Not supported for Rust Cryptography.
|
6257
|
-
*/
|
6258
|
-
getCrossSigningCacheCallbacks() {
|
6259
|
-
var _this$crypto4;
|
6260
|
-
// XXX: Private member access
|
6261
|
-
return (_this$crypto4 = this.crypto) === null || _this$crypto4 === void 0 ? void 0 : _this$crypto4.crossSigningInfo.getCacheCallbacks();
|
6262
|
-
}
|
6263
|
-
|
6264
3832
|
/**
|
6265
3833
|
* Generates a random string suitable for use as a client secret. <strong>This
|
6266
3834
|
* method is experimental and may change.</strong>
|
6267
3835
|
* @returns A new client secret
|
6268
3836
|
*/
|
6269
3837
|
generateClientSecret() {
|
6270
|
-
return
|
3838
|
+
return secureRandomString(32);
|
6271
3839
|
}
|
6272
3840
|
|
6273
3841
|
/**
|
@@ -6276,14 +3844,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6276
3844
|
* @returns A decryption promise
|
6277
3845
|
*/
|
6278
3846
|
decryptEventIfNeeded(event, options) {
|
6279
|
-
|
6280
|
-
event.attemptDecryption(this.cryptoBackend, options);
|
6281
|
-
}
|
6282
|
-
if (event.isBeingDecrypted()) {
|
6283
|
-
return event.getDecryptionPromise();
|
6284
|
-
} else {
|
6285
|
-
return Promise.resolve();
|
6286
|
-
}
|
3847
|
+
return Promise.resolve();
|
6287
3848
|
}
|
6288
3849
|
termsUrlForService(serviceType, baseUrl) {
|
6289
3850
|
switch (serviceType) {
|
@@ -6502,9 +4063,13 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6502
4063
|
/**
|
6503
4064
|
* @returns Promise which resolves to a LoginResponse object
|
6504
4065
|
* @returns Rejects: with an error response.
|
4066
|
+
*
|
4067
|
+
* @deprecated This method has unintuitive behaviour: it updates the `MatrixClient` instance with *some* of the
|
4068
|
+
* returned credentials. Instead, call {@link loginRequest} and create a new `MatrixClient` instance using the
|
4069
|
+
* results. See https://github.com/matrix-org/matrix-js-sdk/issues/4502.
|
6505
4070
|
*/
|
6506
4071
|
login(loginType, data) {
|
6507
|
-
return this.
|
4072
|
+
return this.loginRequest(_objectSpread(_objectSpread({}, data), {}, {
|
6508
4073
|
type: loginType
|
6509
4074
|
})).then(response => {
|
6510
4075
|
if (response.access_token && response.user_id) {
|
@@ -6520,6 +4085,10 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6520
4085
|
/**
|
6521
4086
|
* @returns Promise which resolves to a LoginResponse object
|
6522
4087
|
* @returns Rejects: with an error response.
|
4088
|
+
*
|
4089
|
+
* @deprecated This method has unintuitive behaviour: it updates the `MatrixClient` instance with *some* of the
|
4090
|
+
* returned credentials. Instead, call {@link loginRequest} with `data.type: "m.login.password"`, and create a new
|
4091
|
+
* `MatrixClient` instance using the results. See https://github.com/matrix-org/matrix-js-sdk/issues/4502.
|
6523
4092
|
*/
|
6524
4093
|
loginWithPassword(user, password) {
|
6525
4094
|
return this.login("m.login.password", {
|
@@ -6565,6 +4134,10 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6565
4134
|
* @param token - Login token previously received from homeserver
|
6566
4135
|
* @returns Promise which resolves to a LoginResponse object
|
6567
4136
|
* @returns Rejects: with an error response.
|
4137
|
+
*
|
4138
|
+
* @deprecated This method has unintuitive behaviour: it updates the `MatrixClient` instance with *some* of the
|
4139
|
+
* returned credentials. Instead, call {@link loginRequest} with `data.type: "m.login.token"`, and create a new
|
4140
|
+
* `MatrixClient` instance using the results. See https://github.com/matrix-org/matrix-js-sdk/issues/4502.
|
6568
4141
|
*/
|
6569
4142
|
loginWithToken(token) {
|
6570
4143
|
return this.login("m.login.token", {
|
@@ -6572,6 +4145,23 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6572
4145
|
});
|
6573
4146
|
}
|
6574
4147
|
|
4148
|
+
/**
|
4149
|
+
* Sends a `POST /login` request to the server.
|
4150
|
+
*
|
4151
|
+
* If successful, this will create a new device and access token for the user.
|
4152
|
+
*
|
4153
|
+
* @see {@link MatrixClient.loginFlows} which makes a `GET /login` request.
|
4154
|
+
* @see https://spec.matrix.org/v1.13/client-server-api/#post_matrixclientv3login
|
4155
|
+
*
|
4156
|
+
* @param data - Credentials and other details for the login request.
|
4157
|
+
*/
|
4158
|
+
loginRequest(data) {
|
4159
|
+
var _this39 = this;
|
4160
|
+
return _asyncToGenerator(function* () {
|
4161
|
+
return yield _this39.http.authedRequest(Method.Post, "/login", undefined, data);
|
4162
|
+
})();
|
4163
|
+
}
|
4164
|
+
|
6575
4165
|
/**
|
6576
4166
|
* Logs out the current session.
|
6577
4167
|
* Obviously, further calls that require authorisation should fail after this
|
@@ -6582,23 +4172,15 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6582
4172
|
* @returns Promise which resolves: On success, the empty object `{}`
|
6583
4173
|
*/
|
6584
4174
|
logout() {
|
6585
|
-
var
|
6586
|
-
|
4175
|
+
var _arguments7 = arguments,
|
4176
|
+
_this40 = this;
|
6587
4177
|
return _asyncToGenerator(function* () {
|
6588
|
-
var
|
6589
|
-
var stopClient = _arguments9.length > 0 && _arguments9[0] !== undefined ? _arguments9[0] : false;
|
6590
|
-
if ((_this65$crypto = _this65.crypto) !== null && _this65$crypto !== void 0 && (_this65$crypto = _this65$crypto.backupManager) !== null && _this65$crypto !== void 0 && _this65$crypto.getKeyBackupEnabled()) {
|
6591
|
-
try {
|
6592
|
-
while ((yield _this65.crypto.backupManager.backupPendingKeys(200)) > 0);
|
6593
|
-
} catch (err) {
|
6594
|
-
_this65.logger.error("Key backup request failed when logging out. Some keys may be missing from backup", err);
|
6595
|
-
}
|
6596
|
-
}
|
4178
|
+
var stopClient = _arguments7.length > 0 && _arguments7[0] !== undefined ? _arguments7[0] : false;
|
6597
4179
|
if (stopClient) {
|
6598
|
-
|
6599
|
-
|
4180
|
+
_this40.stopClient();
|
4181
|
+
_this40.http.abort();
|
6600
4182
|
}
|
6601
|
-
return
|
4183
|
+
return _this40.http.authedRequest(Method.Post, "/logout");
|
6602
4184
|
})();
|
6603
4185
|
}
|
6604
4186
|
|
@@ -6636,12 +4218,12 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6636
4218
|
* or UIA auth data.
|
6637
4219
|
*/
|
6638
4220
|
requestLoginToken(auth) {
|
6639
|
-
var
|
4221
|
+
var _this41 = this;
|
6640
4222
|
return _asyncToGenerator(function* () {
|
6641
4223
|
var body = {
|
6642
4224
|
auth
|
6643
4225
|
};
|
6644
|
-
return
|
4226
|
+
return _this41.http.authedRequest(Method.Post, "/login/get_token", undefined,
|
6645
4227
|
// no query params
|
6646
4228
|
body, {
|
6647
4229
|
prefix: ClientPrefix.V1
|
@@ -6673,23 +4255,23 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6673
4255
|
* @returns Rejects: with an error response.
|
6674
4256
|
*/
|
6675
4257
|
createRoom(options) {
|
6676
|
-
var
|
4258
|
+
var _this42 = this;
|
6677
4259
|
return _asyncToGenerator(function* () {
|
6678
|
-
var
|
4260
|
+
var _this42$identityServe;
|
6679
4261
|
// eslint-disable-line camelcase
|
6680
4262
|
// some valid options include: room_alias_name, visibility, invite
|
6681
4263
|
|
6682
4264
|
// inject the id_access_token if inviting 3rd party addresses
|
6683
4265
|
var invitesNeedingToken = (options.invite_3pid || []).filter(i => !i.id_access_token);
|
6684
|
-
if (invitesNeedingToken.length > 0 && (
|
6685
|
-
var identityAccessToken = yield
|
4266
|
+
if (invitesNeedingToken.length > 0 && (_this42$identityServe = _this42.identityServer) !== null && _this42$identityServe !== void 0 && _this42$identityServe.getAccessToken) {
|
4267
|
+
var identityAccessToken = yield _this42.identityServer.getAccessToken();
|
6686
4268
|
if (identityAccessToken) {
|
6687
4269
|
for (var invite of invitesNeedingToken) {
|
6688
4270
|
invite.id_access_token = identityAccessToken;
|
6689
4271
|
}
|
6690
4272
|
}
|
6691
4273
|
}
|
6692
|
-
return
|
4274
|
+
return _this42.http.authedRequest(Method.Post, "/createRoom", undefined, options);
|
6693
4275
|
})();
|
6694
4276
|
}
|
6695
4277
|
|
@@ -6873,7 +4455,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6873
4455
|
* @returns Promise which resolves: the empty object, `{}`.
|
6874
4456
|
*/
|
6875
4457
|
setRoomReadMarkersHttpRequest(roomId, rmEventId, rrEventId, rpEventId) {
|
6876
|
-
var
|
4458
|
+
var _this43 = this;
|
6877
4459
|
return _asyncToGenerator(function* () {
|
6878
4460
|
var path = utils.encodeUri("/rooms/$roomId/read_markers", {
|
6879
4461
|
$roomId: roomId
|
@@ -6882,10 +4464,10 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6882
4464
|
[ReceiptType.FullyRead]: rmEventId,
|
6883
4465
|
[ReceiptType.Read]: rrEventId
|
6884
4466
|
};
|
6885
|
-
if ((yield
|
4467
|
+
if ((yield _this43.doesServerSupportUnstableFeature("org.matrix.msc2285.stable")) || (yield _this43.isVersionSupported("v1.4"))) {
|
6886
4468
|
content[ReceiptType.ReadPrivate] = rpEventId;
|
6887
4469
|
}
|
6888
|
-
return
|
4470
|
+
return _this43.http.authedRequest(Method.Post, path, undefined, content);
|
6889
4471
|
})();
|
6890
4472
|
}
|
6891
4473
|
|
@@ -6918,13 +4500,13 @@ export class MatrixClient extends TypedEventEmitter {
|
|
6918
4500
|
* @returns Rejects: with an error response.
|
6919
4501
|
*/
|
6920
4502
|
publicRooms() {
|
6921
|
-
var
|
4503
|
+
var _ref7 = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : {};
|
6922
4504
|
var {
|
6923
4505
|
server,
|
6924
4506
|
limit,
|
6925
4507
|
since
|
6926
|
-
} =
|
6927
|
-
options = _objectWithoutProperties(
|
4508
|
+
} = _ref7,
|
4509
|
+
options = _objectWithoutProperties(_ref7, _excluded);
|
6928
4510
|
if (Object.keys(options).length === 0) {
|
6929
4511
|
var queryParams = {
|
6930
4512
|
server,
|
@@ -7042,11 +4624,11 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7042
4624
|
* @param options.limit - the maximum number of results to return. The server will apply a limit if unspecified.
|
7043
4625
|
* @returns Promise which resolves: an array of results.
|
7044
4626
|
*/
|
7045
|
-
searchUserDirectory(
|
4627
|
+
searchUserDirectory(_ref8) {
|
7046
4628
|
var {
|
7047
4629
|
term,
|
7048
4630
|
limit
|
7049
|
-
} =
|
4631
|
+
} = _ref8;
|
7050
4632
|
var body = {
|
7051
4633
|
search_term: term
|
7052
4634
|
};
|
@@ -7118,9 +4700,9 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7118
4700
|
* @returns `true` if supported, otherwise `false`
|
7119
4701
|
*/
|
7120
4702
|
doesServerSupportExtendedProfiles() {
|
7121
|
-
var
|
4703
|
+
var _this44 = this;
|
7122
4704
|
return _asyncToGenerator(function* () {
|
7123
|
-
return
|
4705
|
+
return _this44.doesServerSupportUnstableFeature(UNSTABLE_MSC4133_EXTENDED_PROFILES);
|
7124
4706
|
})();
|
7125
4707
|
}
|
7126
4708
|
|
@@ -7130,9 +4712,9 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7130
4712
|
* @returns The prefix for use with `authedRequest`
|
7131
4713
|
*/
|
7132
4714
|
getExtendedProfileRequestPrefix() {
|
7133
|
-
var
|
4715
|
+
var _this45 = this;
|
7134
4716
|
return _asyncToGenerator(function* () {
|
7135
|
-
if (yield
|
4717
|
+
if (yield _this45.doesServerSupportUnstableFeature("uk.tcpip.msc4133.stable")) {
|
7136
4718
|
return ClientPrefix.V3;
|
7137
4719
|
}
|
7138
4720
|
return "/_matrix/client/unstable/uk.tcpip.msc4133";
|
@@ -7150,15 +4732,15 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7150
4732
|
* @throws A M_NOT_FOUND error if the profile could not be found.
|
7151
4733
|
*/
|
7152
4734
|
getExtendedProfile(userId) {
|
7153
|
-
var
|
4735
|
+
var _this46 = this;
|
7154
4736
|
return _asyncToGenerator(function* () {
|
7155
|
-
if (!(yield
|
4737
|
+
if (!(yield _this46.doesServerSupportExtendedProfiles())) {
|
7156
4738
|
throw new Error("Server does not support extended profiles");
|
7157
4739
|
}
|
7158
|
-
return
|
4740
|
+
return _this46.http.authedRequest(Method.Get, utils.encodeUri("/profile/$userId", {
|
7159
4741
|
$userId: userId
|
7160
4742
|
}), undefined, undefined, {
|
7161
|
-
prefix: yield
|
4743
|
+
prefix: yield _this46.getExtendedProfileRequestPrefix()
|
7162
4744
|
});
|
7163
4745
|
})();
|
7164
4746
|
}
|
@@ -7175,16 +4757,16 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7175
4757
|
* @throws A M_NOT_FOUND error if the key was not set OR the profile could not be found.
|
7176
4758
|
*/
|
7177
4759
|
getExtendedProfileProperty(userId, key) {
|
7178
|
-
var
|
4760
|
+
var _this47 = this;
|
7179
4761
|
return _asyncToGenerator(function* () {
|
7180
|
-
if (!(yield
|
4762
|
+
if (!(yield _this47.doesServerSupportExtendedProfiles())) {
|
7181
4763
|
throw new Error("Server does not support extended profiles");
|
7182
4764
|
}
|
7183
|
-
var profile = yield
|
4765
|
+
var profile = yield _this47.http.authedRequest(Method.Get, utils.encodeUri("/profile/$userId/$key", {
|
7184
4766
|
$userId: userId,
|
7185
4767
|
$key: key
|
7186
4768
|
}), undefined, undefined, {
|
7187
|
-
prefix: yield
|
4769
|
+
prefix: yield _this47.getExtendedProfileRequestPrefix()
|
7188
4770
|
});
|
7189
4771
|
return profile[key];
|
7190
4772
|
})();
|
@@ -7200,19 +4782,19 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7200
4782
|
* @throws An error if the server does not support MSC4133 OR the server disallows editing the user profile.
|
7201
4783
|
*/
|
7202
4784
|
setExtendedProfileProperty(key, value) {
|
7203
|
-
var
|
4785
|
+
var _this48 = this;
|
7204
4786
|
return _asyncToGenerator(function* () {
|
7205
|
-
if (!(yield
|
4787
|
+
if (!(yield _this48.doesServerSupportExtendedProfiles())) {
|
7206
4788
|
throw new Error("Server does not support extended profiles");
|
7207
4789
|
}
|
7208
|
-
var userId =
|
7209
|
-
yield
|
4790
|
+
var userId = _this48.getUserId();
|
4791
|
+
yield _this48.http.authedRequest(Method.Put, utils.encodeUri("/profile/$userId/$key", {
|
7210
4792
|
$userId: userId,
|
7211
4793
|
$key: key
|
7212
4794
|
}), undefined, {
|
7213
4795
|
[key]: value
|
7214
4796
|
}, {
|
7215
|
-
prefix: yield
|
4797
|
+
prefix: yield _this48.getExtendedProfileRequestPrefix()
|
7216
4798
|
});
|
7217
4799
|
})();
|
7218
4800
|
}
|
@@ -7226,17 +4808,17 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7226
4808
|
* @throws An error if the server does not support MSC4133 OR the server disallows editing the user profile.
|
7227
4809
|
*/
|
7228
4810
|
deleteExtendedProfileProperty(key) {
|
7229
|
-
var
|
4811
|
+
var _this49 = this;
|
7230
4812
|
return _asyncToGenerator(function* () {
|
7231
|
-
if (!(yield
|
4813
|
+
if (!(yield _this49.doesServerSupportExtendedProfiles())) {
|
7232
4814
|
throw new Error("Server does not support extended profiles");
|
7233
4815
|
}
|
7234
|
-
var userId =
|
7235
|
-
yield
|
4816
|
+
var userId = _this49.getUserId();
|
4817
|
+
yield _this49.http.authedRequest(Method.Delete, utils.encodeUri("/profile/$userId/$key", {
|
7236
4818
|
$userId: userId,
|
7237
4819
|
$key: key
|
7238
4820
|
}), undefined, undefined, {
|
7239
|
-
prefix: yield
|
4821
|
+
prefix: yield _this49.getExtendedProfileRequestPrefix()
|
7240
4822
|
});
|
7241
4823
|
})();
|
7242
4824
|
}
|
@@ -7252,16 +4834,16 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7252
4834
|
* @throws An error if the server does not support MSC4133 OR the server disallows editing the user profile.
|
7253
4835
|
*/
|
7254
4836
|
patchExtendedProfile(profile) {
|
7255
|
-
var
|
4837
|
+
var _this50 = this;
|
7256
4838
|
return _asyncToGenerator(function* () {
|
7257
|
-
if (!(yield
|
4839
|
+
if (!(yield _this50.doesServerSupportExtendedProfiles())) {
|
7258
4840
|
throw new Error("Server does not support extended profiles");
|
7259
4841
|
}
|
7260
|
-
var userId =
|
7261
|
-
return
|
4842
|
+
var userId = _this50.getUserId();
|
4843
|
+
return _this50.http.authedRequest(Method.Patch, utils.encodeUri("/profile/$userId", {
|
7262
4844
|
$userId: userId
|
7263
4845
|
}), {}, profile, {
|
7264
|
-
prefix: yield
|
4846
|
+
prefix: yield _this50.getExtendedProfileRequestPrefix()
|
7265
4847
|
});
|
7266
4848
|
})();
|
7267
4849
|
}
|
@@ -7276,16 +4858,16 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7276
4858
|
* @throws An error if the server does not support MSC4133 OR the server disallows editing the user profile.
|
7277
4859
|
*/
|
7278
4860
|
setExtendedProfile(profile) {
|
7279
|
-
var
|
4861
|
+
var _this51 = this;
|
7280
4862
|
return _asyncToGenerator(function* () {
|
7281
|
-
if (!(yield
|
4863
|
+
if (!(yield _this51.doesServerSupportExtendedProfiles())) {
|
7282
4864
|
throw new Error("Server does not support extended profiles");
|
7283
4865
|
}
|
7284
|
-
var userId =
|
7285
|
-
yield
|
4866
|
+
var userId = _this51.getUserId();
|
4867
|
+
yield _this51.http.authedRequest(Method.Put, utils.encodeUri("/profile/$userId", {
|
7286
4868
|
$userId: userId
|
7287
4869
|
}), {}, profile, {
|
7288
|
-
prefix: yield
|
4870
|
+
prefix: yield _this51.getExtendedProfileRequestPrefix()
|
7289
4871
|
});
|
7290
4872
|
})();
|
7291
4873
|
}
|
@@ -7308,10 +4890,10 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7308
4890
|
* @returns Rejects: with an error response.
|
7309
4891
|
*/
|
7310
4892
|
addThreePidOnly(data) {
|
7311
|
-
var
|
4893
|
+
var _this52 = this;
|
7312
4894
|
return _asyncToGenerator(function* () {
|
7313
4895
|
var path = "/account/3pid/add";
|
7314
|
-
return
|
4896
|
+
return _this52.http.authedRequest(Method.Post, path, undefined, data);
|
7315
4897
|
})();
|
7316
4898
|
}
|
7317
4899
|
|
@@ -7327,10 +4909,10 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7327
4909
|
* @returns Rejects: with an error response.
|
7328
4910
|
*/
|
7329
4911
|
bindThreePid(data) {
|
7330
|
-
var
|
4912
|
+
var _this53 = this;
|
7331
4913
|
return _asyncToGenerator(function* () {
|
7332
4914
|
var path = "/account/3pid/bind";
|
7333
|
-
return
|
4915
|
+
return _this53.http.authedRequest(Method.Post, path, undefined, data);
|
7334
4916
|
})();
|
7335
4917
|
}
|
7336
4918
|
|
@@ -7348,15 +4930,15 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7348
4930
|
unbindThreePid(medium, address
|
7349
4931
|
// eslint-disable-next-line camelcase
|
7350
4932
|
) {
|
7351
|
-
var
|
4933
|
+
var _this54 = this;
|
7352
4934
|
return _asyncToGenerator(function* () {
|
7353
4935
|
var path = "/account/3pid/unbind";
|
7354
4936
|
var data = {
|
7355
4937
|
medium,
|
7356
4938
|
address,
|
7357
|
-
id_server:
|
4939
|
+
id_server: _this54.getIdentityServerUrl(true)
|
7358
4940
|
};
|
7359
|
-
return
|
4941
|
+
return _this54.http.authedRequest(Method.Post, path, undefined, data);
|
7360
4942
|
})();
|
7361
4943
|
}
|
7362
4944
|
|
@@ -7478,13 +5060,13 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7478
5060
|
* @returns Rejects: with an error response.
|
7479
5061
|
*/
|
7480
5062
|
getPushers() {
|
7481
|
-
var
|
5063
|
+
var _this55 = this;
|
7482
5064
|
return _asyncToGenerator(function* () {
|
7483
|
-
var response = yield
|
5065
|
+
var response = yield _this55.http.authedRequest(Method.Get, "/pushers");
|
7484
5066
|
|
7485
5067
|
// Migration path for clients that connect to a homeserver that does not support
|
7486
5068
|
// MSC3881 yet, see https://github.com/matrix-org/matrix-spec-proposals/blob/kerry/remote-push-toggle/proposals/3881-remote-push-notification-toggling.md#migration
|
7487
|
-
if (!(yield
|
5069
|
+
if (!(yield _this55.doesServerSupportUnstableFeature("org.matrix.msc3881"))) {
|
7488
5070
|
response.pushers = response.pushers.map(pusher => {
|
7489
5071
|
if (!pusher.hasOwnProperty(PUSHER_ENABLED.name)) {
|
7490
5072
|
pusher[PUSHER_ENABLED.name] = true;
|
@@ -7623,11 +5205,11 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7623
5205
|
* @returns Promise which resolves to the search response object.
|
7624
5206
|
* @returns Rejects: with an error response.
|
7625
5207
|
*/
|
7626
|
-
search(
|
5208
|
+
search(_ref9, abortSignal) {
|
7627
5209
|
var {
|
7628
5210
|
body,
|
7629
5211
|
next_batch: nextBatch
|
7630
|
-
} =
|
5212
|
+
} = _ref9;
|
7631
5213
|
var queryParams = {};
|
7632
5214
|
if (nextBatch) {
|
7633
5215
|
queryParams.next_batch = nextBatch;
|
@@ -7637,86 +5219,6 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7637
5219
|
});
|
7638
5220
|
}
|
7639
5221
|
|
7640
|
-
/**
|
7641
|
-
* Upload keys
|
7642
|
-
*
|
7643
|
-
* @param content - body of upload request
|
7644
|
-
*
|
7645
|
-
* @param opts - this method no longer takes any opts,
|
7646
|
-
* used to take opts.device_id but this was not removed from the spec as a redundant parameter
|
7647
|
-
*
|
7648
|
-
* @returns Promise which resolves: result object. Rejects: with
|
7649
|
-
* an error response ({@link MatrixError}).
|
7650
|
-
*/
|
7651
|
-
uploadKeysRequest(content, opts) {
|
7652
|
-
return this.http.authedRequest(Method.Post, "/keys/upload", undefined, content);
|
7653
|
-
}
|
7654
|
-
uploadKeySignatures(content) {
|
7655
|
-
return this.http.authedRequest(Method.Post, "/keys/signatures/upload", undefined, content);
|
7656
|
-
}
|
7657
|
-
|
7658
|
-
/**
|
7659
|
-
* Download device keys
|
7660
|
-
*
|
7661
|
-
* @param userIds - list of users to get keys for
|
7662
|
-
*
|
7663
|
-
* @param token - sync token to pass in the query request, to help
|
7664
|
-
* the HS give the most recent results
|
7665
|
-
*
|
7666
|
-
* @returns Promise which resolves: result object. Rejects: with
|
7667
|
-
* an error response ({@link MatrixError}).
|
7668
|
-
*/
|
7669
|
-
downloadKeysForUsers(userIds) {
|
7670
|
-
var {
|
7671
|
-
token
|
7672
|
-
} = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
|
7673
|
-
var content = {
|
7674
|
-
device_keys: {}
|
7675
|
-
};
|
7676
|
-
if (token !== undefined) {
|
7677
|
-
content.token = token;
|
7678
|
-
}
|
7679
|
-
userIds.forEach(u => {
|
7680
|
-
content.device_keys[u] = [];
|
7681
|
-
});
|
7682
|
-
return this.http.authedRequest(Method.Post, "/keys/query", undefined, content);
|
7683
|
-
}
|
7684
|
-
|
7685
|
-
/**
|
7686
|
-
* Claim one-time keys
|
7687
|
-
*
|
7688
|
-
* @param devices - a list of [userId, deviceId] pairs
|
7689
|
-
*
|
7690
|
-
* @param keyAlgorithm - desired key type
|
7691
|
-
*
|
7692
|
-
* @param timeout - the time (in milliseconds) to wait for keys from remote
|
7693
|
-
* servers
|
7694
|
-
*
|
7695
|
-
* @returns Promise which resolves: result object. Rejects: with
|
7696
|
-
* an error response ({@link MatrixError}).
|
7697
|
-
*/
|
7698
|
-
claimOneTimeKeys(devices) {
|
7699
|
-
var keyAlgorithm = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : "signed_curve25519";
|
7700
|
-
var timeout = arguments.length > 2 ? arguments[2] : undefined;
|
7701
|
-
var queries = {};
|
7702
|
-
if (keyAlgorithm === undefined) {
|
7703
|
-
keyAlgorithm = "signed_curve25519";
|
7704
|
-
}
|
7705
|
-
for (var [userId, _deviceId] of devices) {
|
7706
|
-
var query = queries[userId] || {};
|
7707
|
-
safeSet(queries, userId, query);
|
7708
|
-
safeSet(query, _deviceId, keyAlgorithm);
|
7709
|
-
}
|
7710
|
-
var content = {
|
7711
|
-
one_time_keys: queries
|
7712
|
-
};
|
7713
|
-
if (timeout) {
|
7714
|
-
content.timeout = timeout;
|
7715
|
-
}
|
7716
|
-
var path = "/keys/claim";
|
7717
|
-
return this.http.authedRequest(Method.Post, path, undefined, content);
|
7718
|
-
}
|
7719
|
-
|
7720
5222
|
/**
|
7721
5223
|
* Ask the server for a list of users who have changed their device lists
|
7722
5224
|
* between a pair of sync tokens
|
@@ -7732,16 +5234,6 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7732
5234
|
};
|
7733
5235
|
return this.http.authedRequest(Method.Get, "/keys/changes", qps);
|
7734
5236
|
}
|
7735
|
-
uploadDeviceSigningKeys(auth, keys) {
|
7736
|
-
// API returns empty object
|
7737
|
-
var data = Object.assign({}, keys);
|
7738
|
-
if (auth) Object.assign(data, {
|
7739
|
-
auth
|
7740
|
-
});
|
7741
|
-
return this.http.authedRequest(Method.Post, "/keys/device_signing/upload", undefined, data, {
|
7742
|
-
prefix: ClientPrefix.Unstable
|
7743
|
-
});
|
7744
|
-
}
|
7745
5237
|
|
7746
5238
|
/**
|
7747
5239
|
* Register with an identity server using the OpenID token from the user's
|
@@ -7914,7 +5406,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7914
5406
|
* found MXIDs. Results where no user could be found will not be listed.
|
7915
5407
|
*/
|
7916
5408
|
identityHashedLookup(addressPairs, identityAccessToken) {
|
7917
|
-
var
|
5409
|
+
var _this56 = this;
|
7918
5410
|
return _asyncToGenerator(function* () {
|
7919
5411
|
var params = {
|
7920
5412
|
// addresses: ["email@example.org", "10005550000"],
|
@@ -7923,7 +5415,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7923
5415
|
};
|
7924
5416
|
|
7925
5417
|
// Get hash information first before trying to do a lookup
|
7926
|
-
var hashes = yield
|
5418
|
+
var hashes = yield _this56.getIdentityHashDetails(identityAccessToken);
|
7927
5419
|
if (!hashes || !hashes["lookup_pepper"] || !hashes["algorithms"]) {
|
7928
5420
|
throw new Error("Unsupported identity server: bad response");
|
7929
5421
|
}
|
@@ -7936,7 +5428,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7936
5428
|
// When picking an algorithm, we pick the hashed over no hashes
|
7937
5429
|
if (hashes["algorithms"].includes("sha256")) {
|
7938
5430
|
params["addresses"] = yield Promise.all(addressPairs.map(/*#__PURE__*/function () {
|
7939
|
-
var
|
5431
|
+
var _ref10 = _asyncToGenerator(function* (p) {
|
7940
5432
|
var addr = p[0].toLowerCase(); // lowercase to get consistent hashes
|
7941
5433
|
var med = p[1].toLowerCase();
|
7942
5434
|
var hashBuffer = yield sha256("".concat(addr, " ").concat(med, " ").concat(params["pepper"]));
|
@@ -7947,8 +5439,8 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7947
5439
|
localMapping[hashed] = p[0];
|
7948
5440
|
return hashed;
|
7949
5441
|
});
|
7950
|
-
return function (
|
7951
|
-
return
|
5442
|
+
return function (_x4) {
|
5443
|
+
return _ref10.apply(this, arguments);
|
7952
5444
|
};
|
7953
5445
|
}()));
|
7954
5446
|
params["algorithm"] = "sha256";
|
@@ -7966,7 +5458,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
7966
5458
|
} else {
|
7967
5459
|
throw new Error("Unsupported identity server: unknown hash algorithm");
|
7968
5460
|
}
|
7969
|
-
var response = yield
|
5461
|
+
var response = yield _this56.http.idServerRequest(Method.Post, "/lookup", params, IdentityPrefix.V2, identityAccessToken);
|
7970
5462
|
if (!(response !== null && response !== void 0 && response["mappings"])) return []; // no results
|
7971
5463
|
|
7972
5464
|
var foundAddresses = [];
|
@@ -8000,12 +5492,12 @@ export class MatrixClient extends TypedEventEmitter {
|
|
8000
5492
|
* @returns Rejects: with an error response.
|
8001
5493
|
*/
|
8002
5494
|
lookupThreePid(medium, address, identityAccessToken) {
|
8003
|
-
var
|
5495
|
+
var _this57 = this;
|
8004
5496
|
return _asyncToGenerator(function* () {
|
8005
5497
|
// Note: we're using the V2 API by calling this function, but our
|
8006
5498
|
// function contract requires a V1 response. We therefore have to
|
8007
5499
|
// convert it manually.
|
8008
|
-
var response = yield
|
5500
|
+
var response = yield _this57.identityHashedLookup([[address, medium]], identityAccessToken);
|
8009
5501
|
var result = response.find(p => p.address === address);
|
8010
5502
|
if (!result) {
|
8011
5503
|
return {};
|
@@ -8037,16 +5529,16 @@ export class MatrixClient extends TypedEventEmitter {
|
|
8037
5529
|
* @returns Rejects: with an error response.
|
8038
5530
|
*/
|
8039
5531
|
bulkLookupThreePids(query, identityAccessToken) {
|
8040
|
-
var
|
5532
|
+
var _this58 = this;
|
8041
5533
|
return _asyncToGenerator(function* () {
|
8042
5534
|
// Note: we're using the V2 API by calling this function, but our
|
8043
5535
|
// function contract requires a V1 response. We therefore have to
|
8044
5536
|
// convert it manually.
|
8045
|
-
var response = yield
|
5537
|
+
var response = yield _this58.identityHashedLookup(
|
8046
5538
|
// We have to reverse the query order to get [address, medium] pairs
|
8047
5539
|
query.map(p => [p[1], p[0]]), identityAccessToken);
|
8048
5540
|
var v1results = [];
|
8049
|
-
var
|
5541
|
+
var _loop = function* _loop(mapping) {
|
8050
5542
|
var originalQuery = query.find(p => p[1] === mapping.address);
|
8051
5543
|
if (!originalQuery) {
|
8052
5544
|
throw new Error("Identity sever returned unexpected results");
|
@@ -8056,7 +5548,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
8056
5548
|
mapping.address, mapping.mxid]);
|
8057
5549
|
};
|
8058
5550
|
for (var mapping of response) {
|
8059
|
-
yield*
|
5551
|
+
yield* _loop(mapping);
|
8060
5552
|
}
|
8061
5553
|
return {
|
8062
5554
|
threepids: v1results
|
@@ -8243,16 +5735,16 @@ export class MatrixClient extends TypedEventEmitter {
|
|
8243
5735
|
* @returns Promise which resolves to the created space.
|
8244
5736
|
*/
|
8245
5737
|
unstableCreateFileTree(name) {
|
8246
|
-
var
|
5738
|
+
var _this59 = this;
|
8247
5739
|
return _asyncToGenerator(function* () {
|
8248
5740
|
var {
|
8249
5741
|
room_id: roomId
|
8250
|
-
} = yield
|
5742
|
+
} = yield _this59.createRoom({
|
8251
5743
|
name: name,
|
8252
5744
|
preset: Preset.PrivateChat,
|
8253
5745
|
power_level_content_override: _objectSpread(_objectSpread({}, DEFAULT_TREE_POWER_LEVELS_TEMPLATE), {}, {
|
8254
5746
|
users: {
|
8255
|
-
[
|
5747
|
+
[_this59.getUserId()]: 100
|
8256
5748
|
}
|
8257
5749
|
}),
|
8258
5750
|
creation_content: {
|
@@ -8264,15 +5756,9 @@ export class MatrixClient extends TypedEventEmitter {
|
|
8264
5756
|
content: {
|
8265
5757
|
[UNSTABLE_MSC3088_ENABLED.name]: true
|
8266
5758
|
}
|
8267
|
-
}, {
|
8268
|
-
type: EventType.RoomEncryption,
|
8269
|
-
state_key: "",
|
8270
|
-
content: {
|
8271
|
-
algorithm: olmlib.MEGOLM_ALGORITHM
|
8272
|
-
}
|
8273
5759
|
}]
|
8274
5760
|
});
|
8275
|
-
return new MSC3089TreeSpace(
|
5761
|
+
return new MSC3089TreeSpace(_this59, roomId);
|
8276
5762
|
})();
|
8277
5763
|
}
|
8278
5764
|
|
@@ -8349,7 +5835,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
8349
5835
|
* @param via - The list of servers which know about the room if only an ID was provided.
|
8350
5836
|
*/
|
8351
5837
|
getRoomSummary(roomIdOrAlias, via) {
|
8352
|
-
var
|
5838
|
+
var _this60 = this;
|
8353
5839
|
return _asyncToGenerator(function* () {
|
8354
5840
|
var paramOpts = {
|
8355
5841
|
prefix: "/_matrix/client/unstable/im.nheko.summary"
|
@@ -8358,7 +5844,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
8358
5844
|
var path = utils.encodeUri("/summary/$roomid", {
|
8359
5845
|
$roomid: roomIdOrAlias
|
8360
5846
|
});
|
8361
|
-
return yield
|
5847
|
+
return yield _this60.http.authedRequest(Method.Get, path, {
|
8362
5848
|
via
|
8363
5849
|
}, undefined, paramOpts);
|
8364
5850
|
} catch (e) {
|
@@ -8366,7 +5852,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
8366
5852
|
var _path = utils.encodeUri("/rooms/$roomid/summary", {
|
8367
5853
|
$roomid: roomIdOrAlias
|
8368
5854
|
});
|
8369
|
-
return yield
|
5855
|
+
return yield _this60.http.authedRequest(Method.Get, _path, {
|
8370
5856
|
via
|
8371
5857
|
}, undefined, paramOpts);
|
8372
5858
|
} else {
|
@@ -8418,9 +5904,9 @@ export class MatrixClient extends TypedEventEmitter {
|
|
8418
5904
|
* Fetches information about the user for the configured access token.
|
8419
5905
|
*/
|
8420
5906
|
whoami() {
|
8421
|
-
var
|
5907
|
+
var _this61 = this;
|
8422
5908
|
return _asyncToGenerator(function* () {
|
8423
|
-
return
|
5909
|
+
return _this61.http.authedRequest(Method.Get, "/account/whoami");
|
8424
5910
|
})();
|
8425
5911
|
}
|
8426
5912
|
|
@@ -8431,7 +5917,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
8431
5917
|
* @returns Rejects: when the request fails (module:http-api.MatrixError)
|
8432
5918
|
*/
|
8433
5919
|
timestampToEvent(roomId, timestamp, dir) {
|
8434
|
-
var
|
5920
|
+
var _this62 = this;
|
8435
5921
|
return _asyncToGenerator(function* () {
|
8436
5922
|
var path = utils.encodeUri("/rooms/$roomId/timestamp_to_event", {
|
8437
5923
|
$roomId: roomId
|
@@ -8441,7 +5927,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
8441
5927
|
dir: dir
|
8442
5928
|
};
|
8443
5929
|
try {
|
8444
|
-
return yield
|
5930
|
+
return yield _this62.http.authedRequest(Method.Get, path, queryParams, undefined, {
|
8445
5931
|
prefix: ClientPrefix.V1
|
8446
5932
|
});
|
8447
5933
|
} catch (err) {
|
@@ -8457,7 +5943,7 @@ export class MatrixClient extends TypedEventEmitter {
|
|
8457
5943
|
// both indicate that this endpoint+verb combination is
|
8458
5944
|
// not supported.
|
8459
5945
|
err.httpStatus === 404 || err.httpStatus === 405)) {
|
8460
|
-
return yield
|
5946
|
+
return yield _this62.http.authedRequest(Method.Get, path, queryParams, undefined, {
|
8461
5947
|
prefix: "/_matrix/client/unstable/org.matrix.msc3030"
|
8462
5948
|
});
|
8463
5949
|
}
|
@@ -8471,100 +5957,57 @@ export class MatrixClient extends TypedEventEmitter {
|
|
8471
5957
|
* @returns Resolves: A promise of an object containing the OIDC issuer if configured
|
8472
5958
|
* @returns Rejects: when the request fails (module:http-api.MatrixError)
|
8473
5959
|
* @experimental - part of MSC2965
|
5960
|
+
* @deprecated in favour of getAuthMetadata
|
8474
5961
|
*/
|
8475
5962
|
getAuthIssuer() {
|
8476
|
-
var
|
5963
|
+
var _this63 = this;
|
8477
5964
|
return _asyncToGenerator(function* () {
|
8478
|
-
return
|
5965
|
+
return _this63.http.request(Method.Get, "/auth_issuer", undefined, undefined, {
|
8479
5966
|
prefix: ClientPrefix.Unstable + "/org.matrix.msc2965"
|
8480
5967
|
});
|
8481
5968
|
})();
|
8482
5969
|
}
|
5970
|
+
|
5971
|
+
/**
|
5972
|
+
* Discover and validate delegated auth configuration
|
5973
|
+
* - delegated auth issuer openid-configuration is reachable
|
5974
|
+
* - delegated auth issuer openid-configuration is configured correctly for us
|
5975
|
+
* Fetches /auth_metadata falling back to legacy implementation using /auth_issuer followed by
|
5976
|
+
* https://oidc-issuer.example.com/.well-known/openid-configuration and other files linked therein.
|
5977
|
+
* When successful, validated metadata is returned
|
5978
|
+
* @returns validated authentication metadata and optionally signing keys
|
5979
|
+
* @throws when delegated auth config is invalid or unreachable
|
5980
|
+
* @experimental - part of MSC2965
|
5981
|
+
*/
|
5982
|
+
getAuthMetadata() {
|
5983
|
+
var _this64 = this;
|
5984
|
+
return _asyncToGenerator(function* () {
|
5985
|
+
var authMetadata;
|
5986
|
+
try {
|
5987
|
+
authMetadata = yield _this64.http.request(Method.Get, "/auth_metadata", undefined, undefined, {
|
5988
|
+
prefix: ClientPrefix.Unstable + "/org.matrix.msc2965"
|
5989
|
+
});
|
5990
|
+
} catch (e) {
|
5991
|
+
if (e instanceof MatrixError && e.errcode === "M_UNRECOGNIZED") {
|
5992
|
+
var {
|
5993
|
+
issuer
|
5994
|
+
} = yield _this64.getAuthIssuer();
|
5995
|
+
return discoverAndValidateOIDCIssuerWellKnown(issuer);
|
5996
|
+
}
|
5997
|
+
throw e;
|
5998
|
+
}
|
5999
|
+
return validateAuthMetadataAndKeys(authMetadata);
|
6000
|
+
})();
|
6001
|
+
}
|
8483
6002
|
}
|
8484
6003
|
_defineProperty(MatrixClient, "RESTORE_BACKUP_ERROR_BAD_KEY", "RESTORE_BACKUP_ERROR_BAD_KEY");
|
8485
6004
|
function getUnstableDelayQueryOpts(delayOpts) {
|
8486
|
-
return Object.fromEntries(Object.entries(delayOpts).map(
|
8487
|
-
var [k, v] =
|
6005
|
+
return Object.fromEntries(Object.entries(delayOpts).map(_ref11 => {
|
6006
|
+
var [k, v] = _ref11;
|
8488
6007
|
return ["".concat(UNSTABLE_MSC4140_DELAYED_EVENTS, ".").concat(k), v];
|
8489
6008
|
}));
|
8490
6009
|
}
|
8491
6010
|
|
8492
|
-
/**
|
8493
|
-
* recalculates an accurate notifications count on event decryption.
|
8494
|
-
* Servers do not have enough knowledge about encrypted events to calculate an
|
8495
|
-
* accurate notification_count
|
8496
|
-
*/
|
8497
|
-
export function fixNotificationCountOnDecryption(cli, event) {
|
8498
|
-
var _actions$tweaks;
|
8499
|
-
var ourUserId = cli.getUserId();
|
8500
|
-
var eventId = event.getId();
|
8501
|
-
var room = cli.getRoom(event.getRoomId());
|
8502
|
-
if (!room || !ourUserId || !eventId) return;
|
8503
|
-
|
8504
|
-
// Due to threads, we can get relation events (eg. edits & reactions) that never get
|
8505
|
-
// added to a timeline and so cannot be found in their own room (their edit / reaction
|
8506
|
-
// still applies to the event it needs to, so it doesn't matter too much). However, if
|
8507
|
-
// we try to process notification about this event, we'll get very confused because we
|
8508
|
-
// won't be able to find the event in the room, so will assume it must be unread, even
|
8509
|
-
// if it's actually read. We therefore skip anything that isn't in the room. This isn't
|
8510
|
-
// *great*, so if we can fix the homeless events (eg. with MSC4023) then we should probably
|
8511
|
-
// remove this workaround.
|
8512
|
-
if (!room.findEventById(eventId)) {
|
8513
|
-
logger.info("Decrypted event ".concat(event.getId(), " is not in room ").concat(room.roomId, ": ignoring"));
|
8514
|
-
return;
|
8515
|
-
}
|
8516
|
-
var isThreadEvent = !!event.threadRootId && !event.isThreadRoot;
|
8517
|
-
var hasReadEvent;
|
8518
|
-
if (isThreadEvent) {
|
8519
|
-
var thread = room.getThread(event.threadRootId);
|
8520
|
-
hasReadEvent = thread ? thread.hasUserReadEvent(ourUserId, eventId) :
|
8521
|
-
// If the thread object does not exist in the room yet, we don't
|
8522
|
-
// want to calculate notification for this event yet. We have not
|
8523
|
-
// restored the read receipts yet and can't accurately calculate
|
8524
|
-
// notifications at this stage.
|
8525
|
-
//
|
8526
|
-
// This issue can likely go away when MSC3874 is implemented
|
8527
|
-
true;
|
8528
|
-
} else {
|
8529
|
-
hasReadEvent = room.hasUserReadEvent(ourUserId, eventId);
|
8530
|
-
}
|
8531
|
-
if (hasReadEvent) {
|
8532
|
-
// If the event has been read, ignore it.
|
8533
|
-
return;
|
8534
|
-
}
|
8535
|
-
var actions = cli.getPushActionsForEvent(event, true);
|
8536
|
-
|
8537
|
-
// Ensure the unread counts are kept up to date if the event is encrypted
|
8538
|
-
// We also want to make sure that the notification count goes up if we already
|
8539
|
-
// have encrypted events to avoid other code from resetting 'highlight' to zero.
|
8540
|
-
var newHighlight = !!(actions !== null && actions !== void 0 && (_actions$tweaks = actions.tweaks) !== null && _actions$tweaks !== void 0 && _actions$tweaks.highlight);
|
8541
|
-
if (newHighlight) {
|
8542
|
-
// TODO: Handle mentions received while the client is offline
|
8543
|
-
// See also https://github.com/vector-im/element-web/issues/9069
|
8544
|
-
var newCount = room.getUnreadCountForEventContext(NotificationCountType.Highlight, event) + 1;
|
8545
|
-
if (isThreadEvent) {
|
8546
|
-
room.setThreadUnreadNotificationCount(event.threadRootId, NotificationCountType.Highlight, newCount);
|
8547
|
-
} else {
|
8548
|
-
room.setUnreadNotificationCount(NotificationCountType.Highlight, newCount);
|
8549
|
-
}
|
8550
|
-
}
|
8551
|
-
|
8552
|
-
// `notify` is used in practice for incrementing the total count
|
8553
|
-
var newNotify = !!(actions !== null && actions !== void 0 && actions.notify);
|
8554
|
-
|
8555
|
-
// The room total count is NEVER incremented by the server for encrypted rooms. We basically ignore
|
8556
|
-
// the server here as it's always going to tell us to increment for encrypted events.
|
8557
|
-
if (newNotify) {
|
8558
|
-
// Total count is used to typically increment a room notification counter, but not loudly highlight it.
|
8559
|
-
var _newCount = room.getUnreadCountForEventContext(NotificationCountType.Total, event) + 1;
|
8560
|
-
if (isThreadEvent) {
|
8561
|
-
room.setThreadUnreadNotificationCount(event.threadRootId, NotificationCountType.Total, _newCount);
|
8562
|
-
} else {
|
8563
|
-
room.setUnreadNotificationCount(NotificationCountType.Total, _newCount);
|
8564
|
-
}
|
8565
|
-
}
|
8566
|
-
}
|
8567
|
-
|
8568
6011
|
/**
|
8569
6012
|
* Given an event, figure out the thread ID we should use for it in a receipt.
|
8570
6013
|
*
|