@unwanted/matrix-sdk-mini 34.12.0 → 36.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (759) hide show
  1. package/git-revision.txt +1 -1
  2. package/lib/@types/event.d.ts +25 -19
  3. package/lib/@types/event.d.ts.map +1 -1
  4. package/lib/@types/event.js +5 -0
  5. package/lib/@types/event.js.map +1 -1
  6. package/lib/@types/global.d.js +0 -2
  7. package/lib/@types/global.d.js.map +1 -1
  8. package/lib/autodiscovery.d.ts +1 -1
  9. package/lib/autodiscovery.d.ts.map +1 -1
  10. package/lib/autodiscovery.js.map +1 -1
  11. package/lib/base64.d.ts +3 -6
  12. package/lib/base64.d.ts.map +1 -1
  13. package/lib/base64.js +43 -36
  14. package/lib/base64.js.map +1 -1
  15. package/lib/browser-index.d.ts.map +1 -1
  16. package/lib/browser-index.js +0 -11
  17. package/lib/browser-index.js.map +1 -1
  18. package/lib/client.d.ts +45 -1306
  19. package/lib/client.d.ts.map +1 -1
  20. package/lib/client.js +406 -2963
  21. package/lib/client.js.map +1 -1
  22. package/lib/digest.d.ts +2 -2
  23. package/lib/digest.d.ts.map +1 -1
  24. package/lib/digest.js +2 -2
  25. package/lib/digest.js.map +1 -1
  26. package/lib/embedded.d.ts +2 -23
  27. package/lib/embedded.d.ts.map +1 -1
  28. package/lib/embedded.js +82 -209
  29. package/lib/embedded.js.map +1 -1
  30. package/lib/event-mapper.d.ts.map +1 -1
  31. package/lib/event-mapper.js +0 -4
  32. package/lib/event-mapper.js.map +1 -1
  33. package/lib/feature.d.ts.map +1 -1
  34. package/lib/feature.js +2 -1
  35. package/lib/feature.js.map +1 -1
  36. package/lib/http-api/errors.d.ts +3 -3
  37. package/lib/http-api/errors.js +3 -3
  38. package/lib/http-api/errors.js.map +1 -1
  39. package/lib/http-api/utils.js +2 -2
  40. package/lib/http-api/utils.js.map +1 -1
  41. package/lib/matrix.d.ts +0 -25
  42. package/lib/matrix.d.ts.map +1 -1
  43. package/lib/matrix.js +1 -30
  44. package/lib/matrix.js.map +1 -1
  45. package/lib/models/MSC3089Branch.d.ts.map +1 -1
  46. package/lib/models/MSC3089Branch.js +0 -3
  47. package/lib/models/MSC3089Branch.js.map +1 -1
  48. package/lib/models/event-timeline-set.d.ts +6 -10
  49. package/lib/models/event-timeline-set.d.ts.map +1 -1
  50. package/lib/models/event-timeline-set.js +28 -36
  51. package/lib/models/event-timeline-set.js.map +1 -1
  52. package/lib/models/event-timeline.d.ts +7 -2
  53. package/lib/models/event-timeline.d.ts.map +1 -1
  54. package/lib/models/event-timeline.js +9 -30
  55. package/lib/models/event-timeline.js.map +1 -1
  56. package/lib/models/event.d.ts +12 -96
  57. package/lib/models/event.d.ts.map +1 -1
  58. package/lib/models/event.js +59 -286
  59. package/lib/models/event.js.map +1 -1
  60. package/lib/models/invites-ignorer-types.d.ts +27 -0
  61. package/lib/models/invites-ignorer-types.d.ts.map +1 -0
  62. package/lib/models/invites-ignorer-types.js +36 -0
  63. package/lib/models/invites-ignorer-types.js.map +1 -0
  64. package/lib/models/invites-ignorer.d.ts +2 -26
  65. package/lib/models/invites-ignorer.d.ts.map +1 -1
  66. package/lib/models/invites-ignorer.js +2 -27
  67. package/lib/models/invites-ignorer.js.map +1 -1
  68. package/lib/models/poll.d.ts.map +1 -1
  69. package/lib/models/poll.js +1 -5
  70. package/lib/models/poll.js.map +1 -1
  71. package/lib/models/relations-container.d.ts.map +1 -1
  72. package/lib/models/relations-container.js +1 -7
  73. package/lib/models/relations-container.js.map +1 -1
  74. package/lib/models/relations.d.ts +0 -1
  75. package/lib/models/relations.d.ts.map +1 -1
  76. package/lib/models/relations.js +0 -8
  77. package/lib/models/relations.js.map +1 -1
  78. package/lib/models/room-member.d.ts +6 -1
  79. package/lib/models/room-member.d.ts.map +1 -1
  80. package/lib/models/room-member.js +7 -1
  81. package/lib/models/room-member.js.map +1 -1
  82. package/lib/models/room-state.d.ts +2 -13
  83. package/lib/models/room-state.d.ts.map +1 -1
  84. package/lib/models/room-state.js +12 -56
  85. package/lib/models/room-state.js.map +1 -1
  86. package/lib/models/room.d.ts +8 -21
  87. package/lib/models/room.d.ts.map +1 -1
  88. package/lib/models/room.js +128 -163
  89. package/lib/models/room.js.map +1 -1
  90. package/lib/models/thread.d.ts.map +1 -1
  91. package/lib/models/thread.js +5 -4
  92. package/lib/models/thread.js.map +1 -1
  93. package/lib/oidc/authorize.d.ts +2 -2
  94. package/lib/oidc/authorize.d.ts.map +1 -1
  95. package/lib/oidc/authorize.js +5 -5
  96. package/lib/oidc/authorize.js.map +1 -1
  97. package/lib/oidc/discovery.d.ts +8 -0
  98. package/lib/oidc/discovery.d.ts.map +1 -1
  99. package/lib/oidc/discovery.js +22 -11
  100. package/lib/oidc/discovery.js.map +1 -1
  101. package/lib/oidc/index.d.ts +3 -4
  102. package/lib/oidc/index.d.ts.map +1 -1
  103. package/lib/oidc/index.js.map +1 -1
  104. package/lib/oidc/register.js +3 -3
  105. package/lib/oidc/register.js.map +1 -1
  106. package/lib/oidc/tokenRefresher.d.ts.map +1 -1
  107. package/lib/oidc/tokenRefresher.js +6 -5
  108. package/lib/oidc/tokenRefresher.js.map +1 -1
  109. package/lib/oidc/validate.d.ts +9 -23
  110. package/lib/oidc/validate.d.ts.map +1 -1
  111. package/lib/oidc/validate.js +13 -28
  112. package/lib/oidc/validate.js.map +1 -1
  113. package/lib/randomstring.d.ts +30 -3
  114. package/lib/randomstring.d.ts.map +1 -1
  115. package/lib/randomstring.js +68 -16
  116. package/lib/randomstring.js.map +1 -1
  117. package/lib/sliding-sync-sdk.d.ts +3 -4
  118. package/lib/sliding-sync-sdk.d.ts.map +1 -1
  119. package/lib/sliding-sync-sdk.js +55 -102
  120. package/lib/sliding-sync-sdk.js.map +1 -1
  121. package/lib/sliding-sync.js +9 -6
  122. package/lib/sliding-sync.js.map +1 -1
  123. package/lib/store/indexeddb-local-backend.js +4 -2
  124. package/lib/store/indexeddb-local-backend.js.map +1 -1
  125. package/lib/store/indexeddb.d.ts +1 -1
  126. package/lib/store/indexeddb.d.ts.map +1 -1
  127. package/lib/store/indexeddb.js.map +1 -1
  128. package/lib/sync-accumulator.d.ts +6 -4
  129. package/lib/sync-accumulator.d.ts.map +1 -1
  130. package/lib/sync-accumulator.js +23 -12
  131. package/lib/sync-accumulator.js.map +1 -1
  132. package/lib/sync.d.ts +10 -13
  133. package/lib/sync.d.ts.map +1 -1
  134. package/lib/sync.js +94 -115
  135. package/lib/sync.js.map +1 -1
  136. package/lib/testing.d.ts +13 -44
  137. package/lib/testing.d.ts.map +1 -1
  138. package/lib/testing.js +36 -99
  139. package/lib/testing.js.map +1 -1
  140. package/lib/types.d.ts +0 -1
  141. package/lib/types.d.ts.map +1 -1
  142. package/lib/types.js.map +1 -1
  143. package/package.json +14 -15
  144. package/src/@types/event.ts +19 -36
  145. package/src/@types/global.d.ts +21 -4
  146. package/src/autodiscovery.ts +1 -1
  147. package/src/base64.ts +38 -40
  148. package/src/browser-index.ts +0 -11
  149. package/src/client.ts +175 -3136
  150. package/src/digest.ts +3 -3
  151. package/src/embedded.ts +43 -149
  152. package/src/event-mapper.ts +0 -4
  153. package/src/feature.ts +1 -0
  154. package/src/http-api/errors.ts +3 -3
  155. package/src/http-api/utils.ts +2 -2
  156. package/src/matrix.ts +0 -41
  157. package/src/models/MSC3089Branch.ts +0 -3
  158. package/src/models/event-timeline-set.ts +17 -38
  159. package/src/models/event-timeline.ts +11 -26
  160. package/src/models/event.ts +54 -295
  161. package/src/models/invites-ignorer-types.ts +48 -0
  162. package/src/models/invites-ignorer.ts +7 -42
  163. package/src/models/poll.ts +0 -6
  164. package/src/models/relations-container.ts +1 -8
  165. package/src/models/relations.ts +0 -8
  166. package/src/models/room-member.ts +16 -1
  167. package/src/models/room-state.ts +4 -37
  168. package/src/models/room.ts +34 -69
  169. package/src/models/thread.ts +4 -3
  170. package/src/oidc/authorize.ts +7 -7
  171. package/src/oidc/discovery.ts +16 -10
  172. package/src/oidc/index.ts +3 -4
  173. package/src/oidc/register.ts +3 -3
  174. package/src/oidc/tokenRefresher.ts +3 -2
  175. package/src/oidc/validate.ts +40 -63
  176. package/src/randomstring.ts +65 -19
  177. package/src/sliding-sync-sdk.ts +10 -83
  178. package/src/sliding-sync.ts +6 -6
  179. package/src/store/indexeddb-local-backend.ts +2 -2
  180. package/src/store/indexeddb.ts +1 -1
  181. package/src/sync-accumulator.ts +33 -16
  182. package/src/sync.ts +112 -143
  183. package/src/testing.ts +36 -103
  184. package/src/types.ts +0 -1
  185. package/CHANGELOG.md +0 -5910
  186. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts +0 -14
  187. package/lib/@types/AESEncryptedSecretStoragePayload.d.ts.map +0 -1
  188. package/lib/@types/AESEncryptedSecretStoragePayload.js +0 -1
  189. package/lib/@types/AESEncryptedSecretStoragePayload.js.map +0 -1
  190. package/lib/@types/crypto.d.ts +0 -47
  191. package/lib/@types/crypto.d.ts.map +0 -1
  192. package/lib/@types/crypto.js +0 -1
  193. package/lib/@types/crypto.js.map +0 -1
  194. package/lib/@types/matrix-sdk-crypto-wasm.d.js +0 -1
  195. package/lib/@types/matrix-sdk-crypto-wasm.d.js.map +0 -1
  196. package/lib/common-crypto/CryptoBackend.d.ts +0 -240
  197. package/lib/common-crypto/CryptoBackend.d.ts.map +0 -1
  198. package/lib/common-crypto/CryptoBackend.js +0 -73
  199. package/lib/common-crypto/CryptoBackend.js.map +0 -1
  200. package/lib/common-crypto/key-passphrase.d.ts +0 -14
  201. package/lib/common-crypto/key-passphrase.d.ts.map +0 -1
  202. package/lib/common-crypto/key-passphrase.js +0 -33
  203. package/lib/common-crypto/key-passphrase.js.map +0 -1
  204. package/lib/crypto/CrossSigning.d.ts +0 -184
  205. package/lib/crypto/CrossSigning.d.ts.map +0 -1
  206. package/lib/crypto/CrossSigning.js +0 -718
  207. package/lib/crypto/CrossSigning.js.map +0 -1
  208. package/lib/crypto/DeviceList.d.ts +0 -216
  209. package/lib/crypto/DeviceList.d.ts.map +0 -1
  210. package/lib/crypto/DeviceList.js +0 -892
  211. package/lib/crypto/DeviceList.js.map +0 -1
  212. package/lib/crypto/EncryptionSetup.d.ts +0 -152
  213. package/lib/crypto/EncryptionSetup.d.ts.map +0 -1
  214. package/lib/crypto/EncryptionSetup.js +0 -356
  215. package/lib/crypto/EncryptionSetup.js.map +0 -1
  216. package/lib/crypto/OlmDevice.d.ts +0 -457
  217. package/lib/crypto/OlmDevice.d.ts.map +0 -1
  218. package/lib/crypto/OlmDevice.js +0 -1241
  219. package/lib/crypto/OlmDevice.js.map +0 -1
  220. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts +0 -109
  221. package/lib/crypto/OutgoingRoomKeyRequestManager.d.ts.map +0 -1
  222. package/lib/crypto/OutgoingRoomKeyRequestManager.js +0 -415
  223. package/lib/crypto/OutgoingRoomKeyRequestManager.js.map +0 -1
  224. package/lib/crypto/RoomList.d.ts +0 -26
  225. package/lib/crypto/RoomList.d.ts.map +0 -1
  226. package/lib/crypto/RoomList.js +0 -71
  227. package/lib/crypto/RoomList.js.map +0 -1
  228. package/lib/crypto/SecretSharing.d.ts +0 -24
  229. package/lib/crypto/SecretSharing.d.ts.map +0 -1
  230. package/lib/crypto/SecretSharing.js +0 -194
  231. package/lib/crypto/SecretSharing.js.map +0 -1
  232. package/lib/crypto/SecretStorage.d.ts +0 -55
  233. package/lib/crypto/SecretStorage.d.ts.map +0 -1
  234. package/lib/crypto/SecretStorage.js +0 -118
  235. package/lib/crypto/SecretStorage.js.map +0 -1
  236. package/lib/crypto/aes.d.ts +0 -6
  237. package/lib/crypto/aes.d.ts.map +0 -1
  238. package/lib/crypto/aes.js +0 -24
  239. package/lib/crypto/aes.js.map +0 -1
  240. package/lib/crypto/algorithms/base.d.ts +0 -156
  241. package/lib/crypto/algorithms/base.d.ts.map +0 -1
  242. package/lib/crypto/algorithms/base.js +0 -187
  243. package/lib/crypto/algorithms/base.js.map +0 -1
  244. package/lib/crypto/algorithms/index.d.ts +0 -4
  245. package/lib/crypto/algorithms/index.d.ts.map +0 -1
  246. package/lib/crypto/algorithms/index.js +0 -20
  247. package/lib/crypto/algorithms/index.js.map +0 -1
  248. package/lib/crypto/algorithms/megolm.d.ts +0 -385
  249. package/lib/crypto/algorithms/megolm.d.ts.map +0 -1
  250. package/lib/crypto/algorithms/megolm.js +0 -1822
  251. package/lib/crypto/algorithms/megolm.js.map +0 -1
  252. package/lib/crypto/algorithms/olm.d.ts +0 -5
  253. package/lib/crypto/algorithms/olm.d.ts.map +0 -1
  254. package/lib/crypto/algorithms/olm.js +0 -299
  255. package/lib/crypto/algorithms/olm.js.map +0 -1
  256. package/lib/crypto/api.d.ts +0 -32
  257. package/lib/crypto/api.d.ts.map +0 -1
  258. package/lib/crypto/api.js +0 -22
  259. package/lib/crypto/api.js.map +0 -1
  260. package/lib/crypto/backup.d.ts +0 -227
  261. package/lib/crypto/backup.d.ts.map +0 -1
  262. package/lib/crypto/backup.js +0 -824
  263. package/lib/crypto/backup.js.map +0 -1
  264. package/lib/crypto/crypto.d.ts +0 -3
  265. package/lib/crypto/crypto.d.ts.map +0 -1
  266. package/lib/crypto/crypto.js +0 -19
  267. package/lib/crypto/crypto.js.map +0 -1
  268. package/lib/crypto/dehydration.d.ts +0 -34
  269. package/lib/crypto/dehydration.d.ts.map +0 -1
  270. package/lib/crypto/dehydration.js +0 -252
  271. package/lib/crypto/dehydration.js.map +0 -1
  272. package/lib/crypto/device-converter.d.ts +0 -9
  273. package/lib/crypto/device-converter.d.ts.map +0 -1
  274. package/lib/crypto/device-converter.js +0 -42
  275. package/lib/crypto/device-converter.js.map +0 -1
  276. package/lib/crypto/deviceinfo.d.ts +0 -99
  277. package/lib/crypto/deviceinfo.d.ts.map +0 -1
  278. package/lib/crypto/deviceinfo.js +0 -148
  279. package/lib/crypto/deviceinfo.js.map +0 -1
  280. package/lib/crypto/index.d.ts +0 -1210
  281. package/lib/crypto/index.d.ts.map +0 -1
  282. package/lib/crypto/index.js +0 -4101
  283. package/lib/crypto/index.js.map +0 -1
  284. package/lib/crypto/key_passphrase.d.ts +0 -14
  285. package/lib/crypto/key_passphrase.d.ts.map +0 -1
  286. package/lib/crypto/key_passphrase.js +0 -44
  287. package/lib/crypto/key_passphrase.js.map +0 -1
  288. package/lib/crypto/keybackup.d.ts +0 -18
  289. package/lib/crypto/keybackup.d.ts.map +0 -1
  290. package/lib/crypto/keybackup.js +0 -1
  291. package/lib/crypto/keybackup.js.map +0 -1
  292. package/lib/crypto/olmlib.d.ts +0 -129
  293. package/lib/crypto/olmlib.d.ts.map +0 -1
  294. package/lib/crypto/olmlib.js +0 -492
  295. package/lib/crypto/olmlib.js.map +0 -1
  296. package/lib/crypto/recoverykey.d.ts +0 -2
  297. package/lib/crypto/recoverykey.d.ts.map +0 -1
  298. package/lib/crypto/recoverykey.js +0 -19
  299. package/lib/crypto/recoverykey.js.map +0 -1
  300. package/lib/crypto/store/base.d.ts +0 -252
  301. package/lib/crypto/store/base.d.ts.map +0 -1
  302. package/lib/crypto/store/base.js +0 -64
  303. package/lib/crypto/store/base.js.map +0 -1
  304. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts +0 -187
  305. package/lib/crypto/store/indexeddb-crypto-store-backend.d.ts.map +0 -1
  306. package/lib/crypto/store/indexeddb-crypto-store-backend.js +0 -1145
  307. package/lib/crypto/store/indexeddb-crypto-store-backend.js.map +0 -1
  308. package/lib/crypto/store/indexeddb-crypto-store.d.ts +0 -432
  309. package/lib/crypto/store/indexeddb-crypto-store.d.ts.map +0 -1
  310. package/lib/crypto/store/indexeddb-crypto-store.js +0 -728
  311. package/lib/crypto/store/indexeddb-crypto-store.js.map +0 -1
  312. package/lib/crypto/store/localStorage-crypto-store.d.ts +0 -119
  313. package/lib/crypto/store/localStorage-crypto-store.d.ts.map +0 -1
  314. package/lib/crypto/store/localStorage-crypto-store.js +0 -531
  315. package/lib/crypto/store/localStorage-crypto-store.js.map +0 -1
  316. package/lib/crypto/store/memory-crypto-store.d.ts +0 -215
  317. package/lib/crypto/store/memory-crypto-store.d.ts.map +0 -1
  318. package/lib/crypto/store/memory-crypto-store.js +0 -622
  319. package/lib/crypto/store/memory-crypto-store.js.map +0 -1
  320. package/lib/crypto/verification/Base.d.ts +0 -105
  321. package/lib/crypto/verification/Base.d.ts.map +0 -1
  322. package/lib/crypto/verification/Base.js +0 -372
  323. package/lib/crypto/verification/Base.js.map +0 -1
  324. package/lib/crypto/verification/Error.d.ts +0 -35
  325. package/lib/crypto/verification/Error.d.ts.map +0 -1
  326. package/lib/crypto/verification/Error.js +0 -86
  327. package/lib/crypto/verification/Error.js.map +0 -1
  328. package/lib/crypto/verification/IllegalMethod.d.ts +0 -15
  329. package/lib/crypto/verification/IllegalMethod.d.ts.map +0 -1
  330. package/lib/crypto/verification/IllegalMethod.js +0 -43
  331. package/lib/crypto/verification/IllegalMethod.js.map +0 -1
  332. package/lib/crypto/verification/QRCode.d.ts +0 -51
  333. package/lib/crypto/verification/QRCode.d.ts.map +0 -1
  334. package/lib/crypto/verification/QRCode.js +0 -277
  335. package/lib/crypto/verification/QRCode.js.map +0 -1
  336. package/lib/crypto/verification/SAS.d.ts +0 -27
  337. package/lib/crypto/verification/SAS.d.ts.map +0 -1
  338. package/lib/crypto/verification/SAS.js +0 -485
  339. package/lib/crypto/verification/SAS.js.map +0 -1
  340. package/lib/crypto/verification/SASDecimal.d.ts +0 -8
  341. package/lib/crypto/verification/SASDecimal.d.ts.map +0 -1
  342. package/lib/crypto/verification/SASDecimal.js +0 -34
  343. package/lib/crypto/verification/SASDecimal.js.map +0 -1
  344. package/lib/crypto/verification/request/Channel.d.ts +0 -18
  345. package/lib/crypto/verification/request/Channel.d.ts.map +0 -1
  346. package/lib/crypto/verification/request/Channel.js +0 -1
  347. package/lib/crypto/verification/request/Channel.js.map +0 -1
  348. package/lib/crypto/verification/request/InRoomChannel.d.ts +0 -113
  349. package/lib/crypto/verification/request/InRoomChannel.d.ts.map +0 -1
  350. package/lib/crypto/verification/request/InRoomChannel.js +0 -351
  351. package/lib/crypto/verification/request/InRoomChannel.js.map +0 -1
  352. package/lib/crypto/verification/request/ToDeviceChannel.d.ts +0 -105
  353. package/lib/crypto/verification/request/ToDeviceChannel.d.ts.map +0 -1
  354. package/lib/crypto/verification/request/ToDeviceChannel.js +0 -328
  355. package/lib/crypto/verification/request/ToDeviceChannel.js.map +0 -1
  356. package/lib/crypto/verification/request/VerificationRequest.d.ts +0 -227
  357. package/lib/crypto/verification/request/VerificationRequest.d.ts.map +0 -1
  358. package/lib/crypto/verification/request/VerificationRequest.js +0 -937
  359. package/lib/crypto/verification/request/VerificationRequest.js.map +0 -1
  360. package/lib/crypto-api/CryptoEvent.d.ts +0 -69
  361. package/lib/crypto-api/CryptoEvent.d.ts.map +0 -1
  362. package/lib/crypto-api/CryptoEvent.js +0 -33
  363. package/lib/crypto-api/CryptoEvent.js.map +0 -1
  364. package/lib/crypto-api/CryptoEventHandlerMap.d.ts +0 -16
  365. package/lib/crypto-api/CryptoEventHandlerMap.d.ts.map +0 -1
  366. package/lib/crypto-api/CryptoEventHandlerMap.js +0 -22
  367. package/lib/crypto-api/CryptoEventHandlerMap.js.map +0 -1
  368. package/lib/crypto-api/index.d.ts +0 -978
  369. package/lib/crypto-api/index.d.ts.map +0 -1
  370. package/lib/crypto-api/index.js +0 -304
  371. package/lib/crypto-api/index.js.map +0 -1
  372. package/lib/crypto-api/key-passphrase.d.ts +0 -11
  373. package/lib/crypto-api/key-passphrase.d.ts.map +0 -1
  374. package/lib/crypto-api/key-passphrase.js +0 -51
  375. package/lib/crypto-api/key-passphrase.js.map +0 -1
  376. package/lib/crypto-api/keybackup.d.ts +0 -88
  377. package/lib/crypto-api/keybackup.d.ts.map +0 -1
  378. package/lib/crypto-api/keybackup.js +0 -1
  379. package/lib/crypto-api/keybackup.js.map +0 -1
  380. package/lib/crypto-api/recovery-key.d.ts +0 -11
  381. package/lib/crypto-api/recovery-key.d.ts.map +0 -1
  382. package/lib/crypto-api/recovery-key.js +0 -65
  383. package/lib/crypto-api/recovery-key.js.map +0 -1
  384. package/lib/crypto-api/verification.d.ts +0 -344
  385. package/lib/crypto-api/verification.d.ts.map +0 -1
  386. package/lib/crypto-api/verification.js +0 -91
  387. package/lib/crypto-api/verification.js.map +0 -1
  388. package/lib/matrixrtc/CallMembership.d.ts +0 -66
  389. package/lib/matrixrtc/CallMembership.d.ts.map +0 -1
  390. package/lib/matrixrtc/CallMembership.js +0 -197
  391. package/lib/matrixrtc/CallMembership.js.map +0 -1
  392. package/lib/matrixrtc/LivekitFocus.d.ts +0 -16
  393. package/lib/matrixrtc/LivekitFocus.d.ts.map +0 -1
  394. package/lib/matrixrtc/LivekitFocus.js +0 -20
  395. package/lib/matrixrtc/LivekitFocus.js.map +0 -1
  396. package/lib/matrixrtc/MatrixRTCSession.d.ts +0 -295
  397. package/lib/matrixrtc/MatrixRTCSession.d.ts.map +0 -1
  398. package/lib/matrixrtc/MatrixRTCSession.js +0 -1043
  399. package/lib/matrixrtc/MatrixRTCSession.js.map +0 -1
  400. package/lib/matrixrtc/MatrixRTCSessionManager.d.ts +0 -40
  401. package/lib/matrixrtc/MatrixRTCSessionManager.d.ts.map +0 -1
  402. package/lib/matrixrtc/MatrixRTCSessionManager.js +0 -146
  403. package/lib/matrixrtc/MatrixRTCSessionManager.js.map +0 -1
  404. package/lib/matrixrtc/focus.d.ts +0 -10
  405. package/lib/matrixrtc/focus.d.ts.map +0 -1
  406. package/lib/matrixrtc/focus.js +0 -1
  407. package/lib/matrixrtc/focus.js.map +0 -1
  408. package/lib/matrixrtc/index.d.ts +0 -7
  409. package/lib/matrixrtc/index.d.ts.map +0 -1
  410. package/lib/matrixrtc/index.js +0 -21
  411. package/lib/matrixrtc/index.js.map +0 -1
  412. package/lib/matrixrtc/types.d.ts +0 -19
  413. package/lib/matrixrtc/types.d.ts.map +0 -1
  414. package/lib/matrixrtc/types.js +0 -1
  415. package/lib/matrixrtc/types.js.map +0 -1
  416. package/lib/rendezvous/MSC4108SignInWithQR.d.ts +0 -112
  417. package/lib/rendezvous/MSC4108SignInWithQR.d.ts.map +0 -1
  418. package/lib/rendezvous/MSC4108SignInWithQR.js +0 -392
  419. package/lib/rendezvous/MSC4108SignInWithQR.js.map +0 -1
  420. package/lib/rendezvous/RendezvousChannel.d.ts +0 -27
  421. package/lib/rendezvous/RendezvousChannel.d.ts.map +0 -1
  422. package/lib/rendezvous/RendezvousChannel.js +0 -1
  423. package/lib/rendezvous/RendezvousChannel.js.map +0 -1
  424. package/lib/rendezvous/RendezvousCode.d.ts +0 -9
  425. package/lib/rendezvous/RendezvousCode.d.ts.map +0 -1
  426. package/lib/rendezvous/RendezvousCode.js +0 -1
  427. package/lib/rendezvous/RendezvousCode.js.map +0 -1
  428. package/lib/rendezvous/RendezvousError.d.ts +0 -6
  429. package/lib/rendezvous/RendezvousError.d.ts.map +0 -1
  430. package/lib/rendezvous/RendezvousError.js +0 -23
  431. package/lib/rendezvous/RendezvousError.js.map +0 -1
  432. package/lib/rendezvous/RendezvousFailureReason.d.ts +0 -31
  433. package/lib/rendezvous/RendezvousFailureReason.d.ts.map +0 -1
  434. package/lib/rendezvous/RendezvousFailureReason.js +0 -38
  435. package/lib/rendezvous/RendezvousFailureReason.js.map +0 -1
  436. package/lib/rendezvous/RendezvousIntent.d.ts +0 -5
  437. package/lib/rendezvous/RendezvousIntent.d.ts.map +0 -1
  438. package/lib/rendezvous/RendezvousIntent.js +0 -22
  439. package/lib/rendezvous/RendezvousIntent.js.map +0 -1
  440. package/lib/rendezvous/RendezvousTransport.d.ts +0 -36
  441. package/lib/rendezvous/RendezvousTransport.d.ts.map +0 -1
  442. package/lib/rendezvous/RendezvousTransport.js +0 -1
  443. package/lib/rendezvous/RendezvousTransport.js.map +0 -1
  444. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts +0 -58
  445. package/lib/rendezvous/channels/MSC4108SecureChannel.d.ts.map +0 -1
  446. package/lib/rendezvous/channels/MSC4108SecureChannel.js +0 -246
  447. package/lib/rendezvous/channels/MSC4108SecureChannel.js.map +0 -1
  448. package/lib/rendezvous/channels/index.d.ts +0 -2
  449. package/lib/rendezvous/channels/index.d.ts.map +0 -1
  450. package/lib/rendezvous/channels/index.js +0 -18
  451. package/lib/rendezvous/channels/index.js.map +0 -1
  452. package/lib/rendezvous/index.d.ts +0 -10
  453. package/lib/rendezvous/index.d.ts.map +0 -1
  454. package/lib/rendezvous/index.js +0 -23
  455. package/lib/rendezvous/index.js.map +0 -1
  456. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts +0 -61
  457. package/lib/rendezvous/transports/MSC4108RendezvousSession.d.ts.map +0 -1
  458. package/lib/rendezvous/transports/MSC4108RendezvousSession.js +0 -253
  459. package/lib/rendezvous/transports/MSC4108RendezvousSession.js.map +0 -1
  460. package/lib/rendezvous/transports/index.d.ts +0 -2
  461. package/lib/rendezvous/transports/index.d.ts.map +0 -1
  462. package/lib/rendezvous/transports/index.js +0 -18
  463. package/lib/rendezvous/transports/index.js.map +0 -1
  464. package/lib/rust-crypto/CrossSigningIdentity.d.ts +0 -33
  465. package/lib/rust-crypto/CrossSigningIdentity.d.ts.map +0 -1
  466. package/lib/rust-crypto/CrossSigningIdentity.js +0 -157
  467. package/lib/rust-crypto/CrossSigningIdentity.js.map +0 -1
  468. package/lib/rust-crypto/DehydratedDeviceManager.d.ts +0 -98
  469. package/lib/rust-crypto/DehydratedDeviceManager.d.ts.map +0 -1
  470. package/lib/rust-crypto/DehydratedDeviceManager.js +0 -285
  471. package/lib/rust-crypto/DehydratedDeviceManager.js.map +0 -1
  472. package/lib/rust-crypto/KeyClaimManager.d.ts +0 -33
  473. package/lib/rust-crypto/KeyClaimManager.d.ts.map +0 -1
  474. package/lib/rust-crypto/KeyClaimManager.js +0 -82
  475. package/lib/rust-crypto/KeyClaimManager.js.map +0 -1
  476. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts +0 -43
  477. package/lib/rust-crypto/OutgoingRequestProcessor.d.ts.map +0 -1
  478. package/lib/rust-crypto/OutgoingRequestProcessor.js +0 -195
  479. package/lib/rust-crypto/OutgoingRequestProcessor.js.map +0 -1
  480. package/lib/rust-crypto/OutgoingRequestsManager.d.ts +0 -47
  481. package/lib/rust-crypto/OutgoingRequestsManager.d.ts.map +0 -1
  482. package/lib/rust-crypto/OutgoingRequestsManager.js +0 -148
  483. package/lib/rust-crypto/OutgoingRequestsManager.js.map +0 -1
  484. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts +0 -120
  485. package/lib/rust-crypto/PerSessionKeyBackupDownloader.d.ts.map +0 -1
  486. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js +0 -467
  487. package/lib/rust-crypto/PerSessionKeyBackupDownloader.js.map +0 -1
  488. package/lib/rust-crypto/RoomEncryptor.d.ts +0 -98
  489. package/lib/rust-crypto/RoomEncryptor.d.ts.map +0 -1
  490. package/lib/rust-crypto/RoomEncryptor.js +0 -299
  491. package/lib/rust-crypto/RoomEncryptor.js.map +0 -1
  492. package/lib/rust-crypto/backup.d.ts +0 -254
  493. package/lib/rust-crypto/backup.d.ts.map +0 -1
  494. package/lib/rust-crypto/backup.js +0 -837
  495. package/lib/rust-crypto/backup.js.map +0 -1
  496. package/lib/rust-crypto/constants.d.ts +0 -3
  497. package/lib/rust-crypto/constants.d.ts.map +0 -1
  498. package/lib/rust-crypto/constants.js +0 -19
  499. package/lib/rust-crypto/constants.js.map +0 -1
  500. package/lib/rust-crypto/device-converter.d.ts +0 -28
  501. package/lib/rust-crypto/device-converter.d.ts.map +0 -1
  502. package/lib/rust-crypto/device-converter.js +0 -123
  503. package/lib/rust-crypto/device-converter.js.map +0 -1
  504. package/lib/rust-crypto/index.d.ts +0 -61
  505. package/lib/rust-crypto/index.d.ts.map +0 -1
  506. package/lib/rust-crypto/index.js +0 -152
  507. package/lib/rust-crypto/index.js.map +0 -1
  508. package/lib/rust-crypto/libolm_migration.d.ts +0 -81
  509. package/lib/rust-crypto/libolm_migration.d.ts.map +0 -1
  510. package/lib/rust-crypto/libolm_migration.js +0 -459
  511. package/lib/rust-crypto/libolm_migration.js.map +0 -1
  512. package/lib/rust-crypto/rust-crypto.d.ts +0 -556
  513. package/lib/rust-crypto/rust-crypto.d.ts.map +0 -1
  514. package/lib/rust-crypto/rust-crypto.js +0 -2016
  515. package/lib/rust-crypto/rust-crypto.js.map +0 -1
  516. package/lib/rust-crypto/secret-storage.d.ts +0 -22
  517. package/lib/rust-crypto/secret-storage.d.ts.map +0 -1
  518. package/lib/rust-crypto/secret-storage.js +0 -63
  519. package/lib/rust-crypto/secret-storage.js.map +0 -1
  520. package/lib/rust-crypto/verification.d.ts +0 -319
  521. package/lib/rust-crypto/verification.d.ts.map +0 -1
  522. package/lib/rust-crypto/verification.js +0 -816
  523. package/lib/rust-crypto/verification.js.map +0 -1
  524. package/lib/secret-storage.d.ts +0 -370
  525. package/lib/secret-storage.d.ts.map +0 -1
  526. package/lib/secret-storage.js +0 -466
  527. package/lib/secret-storage.js.map +0 -1
  528. package/lib/utils/decryptAESSecretStorageItem.d.ts +0 -12
  529. package/lib/utils/decryptAESSecretStorageItem.d.ts.map +0 -1
  530. package/lib/utils/decryptAESSecretStorageItem.js +0 -50
  531. package/lib/utils/decryptAESSecretStorageItem.js.map +0 -1
  532. package/lib/utils/encryptAESSecretStorageItem.d.ts +0 -16
  533. package/lib/utils/encryptAESSecretStorageItem.d.ts.map +0 -1
  534. package/lib/utils/encryptAESSecretStorageItem.js +0 -68
  535. package/lib/utils/encryptAESSecretStorageItem.js.map +0 -1
  536. package/lib/utils/internal/deriveKeys.d.ts +0 -10
  537. package/lib/utils/internal/deriveKeys.d.ts.map +0 -1
  538. package/lib/utils/internal/deriveKeys.js +0 -60
  539. package/lib/utils/internal/deriveKeys.js.map +0 -1
  540. package/lib/webrtc/audioContext.d.ts +0 -15
  541. package/lib/webrtc/audioContext.d.ts.map +0 -1
  542. package/lib/webrtc/audioContext.js +0 -46
  543. package/lib/webrtc/audioContext.js.map +0 -1
  544. package/lib/webrtc/call.d.ts +0 -560
  545. package/lib/webrtc/call.d.ts.map +0 -1
  546. package/lib/webrtc/call.js +0 -2541
  547. package/lib/webrtc/call.js.map +0 -1
  548. package/lib/webrtc/callEventHandler.d.ts +0 -37
  549. package/lib/webrtc/callEventHandler.d.ts.map +0 -1
  550. package/lib/webrtc/callEventHandler.js +0 -344
  551. package/lib/webrtc/callEventHandler.js.map +0 -1
  552. package/lib/webrtc/callEventTypes.d.ts +0 -73
  553. package/lib/webrtc/callEventTypes.d.ts.map +0 -1
  554. package/lib/webrtc/callEventTypes.js +0 -13
  555. package/lib/webrtc/callEventTypes.js.map +0 -1
  556. package/lib/webrtc/callFeed.d.ts +0 -128
  557. package/lib/webrtc/callFeed.d.ts.map +0 -1
  558. package/lib/webrtc/callFeed.js +0 -289
  559. package/lib/webrtc/callFeed.js.map +0 -1
  560. package/lib/webrtc/groupCall.d.ts +0 -323
  561. package/lib/webrtc/groupCall.d.ts.map +0 -1
  562. package/lib/webrtc/groupCall.js +0 -1337
  563. package/lib/webrtc/groupCall.js.map +0 -1
  564. package/lib/webrtc/groupCallEventHandler.d.ts +0 -31
  565. package/lib/webrtc/groupCallEventHandler.d.ts.map +0 -1
  566. package/lib/webrtc/groupCallEventHandler.js +0 -178
  567. package/lib/webrtc/groupCallEventHandler.js.map +0 -1
  568. package/lib/webrtc/mediaHandler.d.ts +0 -89
  569. package/lib/webrtc/mediaHandler.d.ts.map +0 -1
  570. package/lib/webrtc/mediaHandler.js +0 -437
  571. package/lib/webrtc/mediaHandler.js.map +0 -1
  572. package/lib/webrtc/stats/callFeedStatsReporter.d.ts +0 -8
  573. package/lib/webrtc/stats/callFeedStatsReporter.d.ts.map +0 -1
  574. package/lib/webrtc/stats/callFeedStatsReporter.js +0 -82
  575. package/lib/webrtc/stats/callFeedStatsReporter.js.map +0 -1
  576. package/lib/webrtc/stats/callStatsReportGatherer.d.ts +0 -25
  577. package/lib/webrtc/stats/callStatsReportGatherer.d.ts.map +0 -1
  578. package/lib/webrtc/stats/callStatsReportGatherer.js +0 -199
  579. package/lib/webrtc/stats/callStatsReportGatherer.js.map +0 -1
  580. package/lib/webrtc/stats/callStatsReportSummary.d.ts +0 -17
  581. package/lib/webrtc/stats/callStatsReportSummary.d.ts.map +0 -1
  582. package/lib/webrtc/stats/callStatsReportSummary.js +0 -1
  583. package/lib/webrtc/stats/callStatsReportSummary.js.map +0 -1
  584. package/lib/webrtc/stats/connectionStats.d.ts +0 -28
  585. package/lib/webrtc/stats/connectionStats.d.ts.map +0 -1
  586. package/lib/webrtc/stats/connectionStats.js +0 -26
  587. package/lib/webrtc/stats/connectionStats.js.map +0 -1
  588. package/lib/webrtc/stats/connectionStatsBuilder.d.ts +0 -5
  589. package/lib/webrtc/stats/connectionStatsBuilder.d.ts.map +0 -1
  590. package/lib/webrtc/stats/connectionStatsBuilder.js +0 -27
  591. package/lib/webrtc/stats/connectionStatsBuilder.js.map +0 -1
  592. package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts +0 -7
  593. package/lib/webrtc/stats/connectionStatsReportBuilder.d.ts.map +0 -1
  594. package/lib/webrtc/stats/connectionStatsReportBuilder.js +0 -121
  595. package/lib/webrtc/stats/connectionStatsReportBuilder.js.map +0 -1
  596. package/lib/webrtc/stats/groupCallStats.d.ts +0 -22
  597. package/lib/webrtc/stats/groupCallStats.d.ts.map +0 -1
  598. package/lib/webrtc/stats/groupCallStats.js +0 -78
  599. package/lib/webrtc/stats/groupCallStats.js.map +0 -1
  600. package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts +0 -10
  601. package/lib/webrtc/stats/media/mediaSsrcHandler.d.ts.map +0 -1
  602. package/lib/webrtc/stats/media/mediaSsrcHandler.js +0 -57
  603. package/lib/webrtc/stats/media/mediaSsrcHandler.js.map +0 -1
  604. package/lib/webrtc/stats/media/mediaTrackHandler.d.ts +0 -12
  605. package/lib/webrtc/stats/media/mediaTrackHandler.d.ts.map +0 -1
  606. package/lib/webrtc/stats/media/mediaTrackHandler.js +0 -62
  607. package/lib/webrtc/stats/media/mediaTrackHandler.js.map +0 -1
  608. package/lib/webrtc/stats/media/mediaTrackStats.d.ts +0 -86
  609. package/lib/webrtc/stats/media/mediaTrackStats.d.ts.map +0 -1
  610. package/lib/webrtc/stats/media/mediaTrackStats.js +0 -142
  611. package/lib/webrtc/stats/media/mediaTrackStats.js.map +0 -1
  612. package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts +0 -22
  613. package/lib/webrtc/stats/media/mediaTrackStatsHandler.d.ts.map +0 -1
  614. package/lib/webrtc/stats/media/mediaTrackStatsHandler.js +0 -76
  615. package/lib/webrtc/stats/media/mediaTrackStatsHandler.js.map +0 -1
  616. package/lib/webrtc/stats/statsReport.d.ts +0 -99
  617. package/lib/webrtc/stats/statsReport.d.ts.map +0 -1
  618. package/lib/webrtc/stats/statsReport.js +0 -32
  619. package/lib/webrtc/stats/statsReport.js.map +0 -1
  620. package/lib/webrtc/stats/statsReportEmitter.d.ts +0 -15
  621. package/lib/webrtc/stats/statsReportEmitter.d.ts.map +0 -1
  622. package/lib/webrtc/stats/statsReportEmitter.js +0 -33
  623. package/lib/webrtc/stats/statsReportEmitter.js.map +0 -1
  624. package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts +0 -16
  625. package/lib/webrtc/stats/summaryStatsReportGatherer.d.ts.map +0 -1
  626. package/lib/webrtc/stats/summaryStatsReportGatherer.js +0 -116
  627. package/lib/webrtc/stats/summaryStatsReportGatherer.js.map +0 -1
  628. package/lib/webrtc/stats/trackStatsBuilder.d.ts +0 -19
  629. package/lib/webrtc/stats/trackStatsBuilder.d.ts.map +0 -1
  630. package/lib/webrtc/stats/trackStatsBuilder.js +0 -168
  631. package/lib/webrtc/stats/trackStatsBuilder.js.map +0 -1
  632. package/lib/webrtc/stats/transportStats.d.ts +0 -11
  633. package/lib/webrtc/stats/transportStats.d.ts.map +0 -1
  634. package/lib/webrtc/stats/transportStats.js +0 -1
  635. package/lib/webrtc/stats/transportStats.js.map +0 -1
  636. package/lib/webrtc/stats/transportStatsBuilder.d.ts +0 -5
  637. package/lib/webrtc/stats/transportStatsBuilder.d.ts.map +0 -1
  638. package/lib/webrtc/stats/transportStatsBuilder.js +0 -34
  639. package/lib/webrtc/stats/transportStatsBuilder.js.map +0 -1
  640. package/lib/webrtc/stats/valueFormatter.d.ts +0 -4
  641. package/lib/webrtc/stats/valueFormatter.d.ts.map +0 -1
  642. package/lib/webrtc/stats/valueFormatter.js +0 -25
  643. package/lib/webrtc/stats/valueFormatter.js.map +0 -1
  644. package/src/@types/AESEncryptedSecretStoragePayload.ts +0 -29
  645. package/src/@types/crypto.ts +0 -73
  646. package/src/@types/matrix-sdk-crypto-wasm.d.ts +0 -44
  647. package/src/common-crypto/CryptoBackend.ts +0 -302
  648. package/src/common-crypto/README.md +0 -4
  649. package/src/common-crypto/key-passphrase.ts +0 -43
  650. package/src/crypto/CrossSigning.ts +0 -773
  651. package/src/crypto/DeviceList.ts +0 -989
  652. package/src/crypto/EncryptionSetup.ts +0 -351
  653. package/src/crypto/OlmDevice.ts +0 -1500
  654. package/src/crypto/OutgoingRoomKeyRequestManager.ts +0 -485
  655. package/src/crypto/RoomList.ts +0 -70
  656. package/src/crypto/SecretSharing.ts +0 -240
  657. package/src/crypto/SecretStorage.ts +0 -136
  658. package/src/crypto/aes.ts +0 -23
  659. package/src/crypto/algorithms/base.ts +0 -236
  660. package/src/crypto/algorithms/index.ts +0 -20
  661. package/src/crypto/algorithms/megolm.ts +0 -2216
  662. package/src/crypto/algorithms/olm.ts +0 -381
  663. package/src/crypto/api.ts +0 -70
  664. package/src/crypto/backup.ts +0 -922
  665. package/src/crypto/crypto.ts +0 -18
  666. package/src/crypto/dehydration.ts +0 -272
  667. package/src/crypto/device-converter.ts +0 -45
  668. package/src/crypto/deviceinfo.ts +0 -158
  669. package/src/crypto/index.ts +0 -4418
  670. package/src/crypto/key_passphrase.ts +0 -42
  671. package/src/crypto/keybackup.ts +0 -47
  672. package/src/crypto/olmlib.ts +0 -539
  673. package/src/crypto/recoverykey.ts +0 -18
  674. package/src/crypto/store/base.ts +0 -348
  675. package/src/crypto/store/indexeddb-crypto-store-backend.ts +0 -1250
  676. package/src/crypto/store/indexeddb-crypto-store.ts +0 -845
  677. package/src/crypto/store/localStorage-crypto-store.ts +0 -579
  678. package/src/crypto/store/memory-crypto-store.ts +0 -680
  679. package/src/crypto/verification/Base.ts +0 -409
  680. package/src/crypto/verification/Error.ts +0 -76
  681. package/src/crypto/verification/IllegalMethod.ts +0 -50
  682. package/src/crypto/verification/QRCode.ts +0 -310
  683. package/src/crypto/verification/SAS.ts +0 -494
  684. package/src/crypto/verification/SASDecimal.ts +0 -37
  685. package/src/crypto/verification/request/Channel.ts +0 -34
  686. package/src/crypto/verification/request/InRoomChannel.ts +0 -371
  687. package/src/crypto/verification/request/ToDeviceChannel.ts +0 -354
  688. package/src/crypto/verification/request/VerificationRequest.ts +0 -976
  689. package/src/crypto-api/CryptoEvent.ts +0 -93
  690. package/src/crypto-api/CryptoEventHandlerMap.ts +0 -32
  691. package/src/crypto-api/index.ts +0 -1175
  692. package/src/crypto-api/key-passphrase.ts +0 -58
  693. package/src/crypto-api/keybackup.ts +0 -115
  694. package/src/crypto-api/recovery-key.ts +0 -69
  695. package/src/crypto-api/verification.ts +0 -408
  696. package/src/matrixrtc/CallMembership.ts +0 -247
  697. package/src/matrixrtc/LivekitFocus.ts +0 -39
  698. package/src/matrixrtc/MatrixRTCSession.ts +0 -1319
  699. package/src/matrixrtc/MatrixRTCSessionManager.ts +0 -166
  700. package/src/matrixrtc/focus.ts +0 -25
  701. package/src/matrixrtc/index.ts +0 -22
  702. package/src/matrixrtc/types.ts +0 -36
  703. package/src/rendezvous/MSC4108SignInWithQR.ts +0 -444
  704. package/src/rendezvous/RendezvousChannel.ts +0 -48
  705. package/src/rendezvous/RendezvousCode.ts +0 -25
  706. package/src/rendezvous/RendezvousError.ts +0 -26
  707. package/src/rendezvous/RendezvousFailureReason.ts +0 -49
  708. package/src/rendezvous/RendezvousIntent.ts +0 -20
  709. package/src/rendezvous/RendezvousTransport.ts +0 -58
  710. package/src/rendezvous/channels/MSC4108SecureChannel.ts +0 -270
  711. package/src/rendezvous/channels/index.ts +0 -17
  712. package/src/rendezvous/index.ts +0 -25
  713. package/src/rendezvous/transports/MSC4108RendezvousSession.ts +0 -270
  714. package/src/rendezvous/transports/index.ts +0 -17
  715. package/src/rust-crypto/CrossSigningIdentity.ts +0 -183
  716. package/src/rust-crypto/DehydratedDeviceManager.ts +0 -306
  717. package/src/rust-crypto/KeyClaimManager.ts +0 -86
  718. package/src/rust-crypto/OutgoingRequestProcessor.ts +0 -236
  719. package/src/rust-crypto/OutgoingRequestsManager.ts +0 -143
  720. package/src/rust-crypto/PerSessionKeyBackupDownloader.ts +0 -501
  721. package/src/rust-crypto/RoomEncryptor.ts +0 -352
  722. package/src/rust-crypto/backup.ts +0 -881
  723. package/src/rust-crypto/constants.ts +0 -18
  724. package/src/rust-crypto/device-converter.ts +0 -128
  725. package/src/rust-crypto/index.ts +0 -237
  726. package/src/rust-crypto/libolm_migration.ts +0 -530
  727. package/src/rust-crypto/rust-crypto.ts +0 -2205
  728. package/src/rust-crypto/secret-storage.ts +0 -60
  729. package/src/rust-crypto/verification.ts +0 -830
  730. package/src/secret-storage.ts +0 -693
  731. package/src/utils/decryptAESSecretStorageItem.ts +0 -54
  732. package/src/utils/encryptAESSecretStorageItem.ts +0 -73
  733. package/src/utils/internal/deriveKeys.ts +0 -63
  734. package/src/webrtc/audioContext.ts +0 -44
  735. package/src/webrtc/call.ts +0 -3074
  736. package/src/webrtc/callEventHandler.ts +0 -425
  737. package/src/webrtc/callEventTypes.ts +0 -93
  738. package/src/webrtc/callFeed.ts +0 -364
  739. package/src/webrtc/groupCall.ts +0 -1735
  740. package/src/webrtc/groupCallEventHandler.ts +0 -234
  741. package/src/webrtc/mediaHandler.ts +0 -484
  742. package/src/webrtc/stats/callFeedStatsReporter.ts +0 -94
  743. package/src/webrtc/stats/callStatsReportGatherer.ts +0 -219
  744. package/src/webrtc/stats/callStatsReportSummary.ts +0 -30
  745. package/src/webrtc/stats/connectionStats.ts +0 -47
  746. package/src/webrtc/stats/connectionStatsBuilder.ts +0 -28
  747. package/src/webrtc/stats/connectionStatsReportBuilder.ts +0 -140
  748. package/src/webrtc/stats/groupCallStats.ts +0 -93
  749. package/src/webrtc/stats/media/mediaSsrcHandler.ts +0 -57
  750. package/src/webrtc/stats/media/mediaTrackHandler.ts +0 -76
  751. package/src/webrtc/stats/media/mediaTrackStats.ts +0 -176
  752. package/src/webrtc/stats/media/mediaTrackStatsHandler.ts +0 -90
  753. package/src/webrtc/stats/statsReport.ts +0 -133
  754. package/src/webrtc/stats/statsReportEmitter.ts +0 -49
  755. package/src/webrtc/stats/summaryStatsReportGatherer.ts +0 -148
  756. package/src/webrtc/stats/trackStatsBuilder.ts +0 -207
  757. package/src/webrtc/stats/transportStats.ts +0 -26
  758. package/src/webrtc/stats/transportStatsBuilder.ts +0 -48
  759. package/src/webrtc/stats/valueFormatter.ts +0 -27
@@ -1,2016 +0,0 @@
1
- import _asyncToGenerator from "@babel/runtime/helpers/asyncToGenerator";
2
- import _defineProperty from "@babel/runtime/helpers/defineProperty";
3
- function ownKeys(e, r) { var t = Object.keys(e); if (Object.getOwnPropertySymbols) { var o = Object.getOwnPropertySymbols(e); r && (o = o.filter(function (r) { return Object.getOwnPropertyDescriptor(e, r).enumerable; })), t.push.apply(t, o); } return t; }
4
- function _objectSpread(e) { for (var r = 1; r < arguments.length; r++) { var t = null != arguments[r] ? arguments[r] : {}; r % 2 ? ownKeys(Object(t), !0).forEach(function (r) { _defineProperty(e, r, t[r]); }) : Object.getOwnPropertyDescriptors ? Object.defineProperties(e, Object.getOwnPropertyDescriptors(t)) : ownKeys(Object(t)).forEach(function (r) { Object.defineProperty(e, r, Object.getOwnPropertyDescriptor(t, r)); }); } return e; }
5
- /*
6
- Copyright 2022-2023 The Matrix.org Foundation C.I.C.
7
-
8
- Licensed under the Apache License, Version 2.0 (the "License");
9
- you may not use this file except in compliance with the License.
10
- You may obtain a copy of the License at
11
-
12
- http://www.apache.org/licenses/LICENSE-2.0
13
-
14
- Unless required by applicable law or agreed to in writing, software
15
- distributed under the License is distributed on an "AS IS" BASIS,
16
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17
- See the License for the specific language governing permissions and
18
- limitations under the License.
19
- */
20
-
21
- import anotherjson from "another-json";
22
- import * as RustSdkCryptoJs from "@matrix-org/matrix-sdk-crypto-wasm";
23
- import { KnownMembership } from "../@types/membership.js";
24
- import { MatrixEventEvent } from "../models/event.js";
25
- import { DecryptionError } from "../common-crypto/CryptoBackend.js";
26
- import { logger, LogSpan } from "../logger.js";
27
- import { Method } from "../http-api/index.js";
28
- import { RoomEncryptor } from "./RoomEncryptor.js";
29
- import { OutgoingRequestProcessor } from "./OutgoingRequestProcessor.js";
30
- import { KeyClaimManager } from "./KeyClaimManager.js";
31
- import { logDuration, MapWithDefault } from "../utils.js";
32
- import { CrossSigningKey, DecryptionFailureCode, DeviceVerificationStatus, EventShieldColour, EventShieldReason, UserVerificationStatus, encodeRecoveryKey, deriveRecoveryKeyFromPassphrase, AllDevicesIsolationMode, DeviceIsolationModeKind, CryptoEvent } from "../crypto-api/index.js";
33
- import { deviceKeysToDeviceMap, rustDeviceToJsDevice } from "./device-converter.js";
34
- import { SECRET_STORAGE_ALGORITHM_V1_AES } from "../secret-storage.js";
35
- import { CrossSigningIdentity } from "./CrossSigningIdentity.js";
36
- import { secretStorageCanAccessSecrets, secretStorageContainsCrossSigningKeys } from "./secret-storage.js";
37
- import { isVerificationEvent, RustVerificationRequest, verificationMethodIdentifierToMethod } from "./verification.js";
38
- import { EventType, MsgType } from "../@types/event.js";
39
- import { TypedEventEmitter } from "../models/typed-event-emitter.js";
40
- import { decryptionKeyMatchesKeyBackupInfo, RustBackupManager } from "./backup.js";
41
- import { TypedReEmitter } from "../ReEmitter.js";
42
- import { randomString } from "../randomstring.js";
43
- import { ClientStoppedError } from "../errors.js";
44
- import { decodeBase64, encodeBase64 } from "../base64.js";
45
- import { OutgoingRequestsManager } from "./OutgoingRequestsManager.js";
46
- import { PerSessionKeyBackupDownloader } from "./PerSessionKeyBackupDownloader.js";
47
- import { DehydratedDeviceManager } from "./DehydratedDeviceManager.js";
48
- import { VerificationMethod } from "../types.js";
49
- import { keyFromAuthData } from "../common-crypto/key-passphrase.js";
50
- var ALL_VERIFICATION_METHODS = [VerificationMethod.Sas, VerificationMethod.ScanQrCode, VerificationMethod.ShowQrCode, VerificationMethod.Reciprocate];
51
- /**
52
- * An implementation of {@link CryptoBackend} using the Rust matrix-sdk-crypto.
53
- *
54
- * @internal
55
- */
56
- export class RustCrypto extends TypedEventEmitter {
57
- constructor(logger, /** The `OlmMachine` from the underlying rust crypto sdk. */
58
- olmMachine,
59
- /**
60
- * Low-level HTTP interface: used to make outgoing requests required by the rust SDK.
61
- *
62
- * We expect it to set the access token, etc.
63
- */
64
- http, /** The local user's User ID. */
65
- userId, /** The local user's Device ID. */
66
- _deviceId, /** Interface to server-side secret storage */
67
- secretStorage, /** Crypto callbacks provided by the application */
68
- cryptoCallbacks) {
69
- super();
70
- this.logger = logger;
71
- this.olmMachine = olmMachine;
72
- this.http = http;
73
- this.userId = userId;
74
- this.secretStorage = secretStorage;
75
- this.cryptoCallbacks = cryptoCallbacks;
76
- /**
77
- * The number of iterations to use when deriving a recovery key from a passphrase.
78
- */
79
- _defineProperty(this, "RECOVERY_KEY_DERIVATION_ITERATIONS", 500000);
80
- _defineProperty(this, "_trustCrossSignedDevices", true);
81
- _defineProperty(this, "deviceIsolationMode", new AllDevicesIsolationMode(false));
82
- /** whether {@link stop} has been called */
83
- _defineProperty(this, "stopped", false);
84
- /** mapping of roomId → encryptor class */
85
- _defineProperty(this, "roomEncryptors", {});
86
- _defineProperty(this, "eventDecryptor", void 0);
87
- _defineProperty(this, "keyClaimManager", void 0);
88
- _defineProperty(this, "outgoingRequestProcessor", void 0);
89
- _defineProperty(this, "crossSigningIdentity", void 0);
90
- _defineProperty(this, "backupManager", void 0);
91
- _defineProperty(this, "outgoingRequestsManager", void 0);
92
- _defineProperty(this, "perSessionBackupDownloader", void 0);
93
- _defineProperty(this, "dehydratedDeviceManager", void 0);
94
- _defineProperty(this, "reemitter", new TypedReEmitter(this));
95
- ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
96
- //
97
- // CryptoApi implementation
98
- //
99
- ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
100
- _defineProperty(this, "globalBlacklistUnverifiedDevices", false);
101
- /**
102
- * The verification methods we offer to the other side during an interactive verification.
103
- */
104
- _defineProperty(this, "_supportedVerificationMethods", ALL_VERIFICATION_METHODS);
105
- this.outgoingRequestProcessor = new OutgoingRequestProcessor(olmMachine, http);
106
- this.outgoingRequestsManager = new OutgoingRequestsManager(this.logger, olmMachine, this.outgoingRequestProcessor);
107
- this.keyClaimManager = new KeyClaimManager(olmMachine, this.outgoingRequestProcessor);
108
- this.backupManager = new RustBackupManager(olmMachine, http, this.outgoingRequestProcessor);
109
- this.perSessionBackupDownloader = new PerSessionKeyBackupDownloader(this.logger, this.olmMachine, this.http, this.backupManager);
110
- this.dehydratedDeviceManager = new DehydratedDeviceManager(this.logger, olmMachine, http, this.outgoingRequestProcessor, secretStorage);
111
- this.eventDecryptor = new EventDecryptor(this.logger, olmMachine, this.perSessionBackupDownloader);
112
- this.reemitter.reEmit(this.backupManager, [CryptoEvent.KeyBackupStatus, CryptoEvent.KeyBackupSessionsRemaining, CryptoEvent.KeyBackupFailed, CryptoEvent.KeyBackupDecryptionKeyCached]);
113
- this.crossSigningIdentity = new CrossSigningIdentity(olmMachine, this.outgoingRequestProcessor, secretStorage);
114
-
115
- // Check and start in background the key backup connection
116
- this.checkKeyBackupAndEnable();
117
- }
118
-
119
- /**
120
- * Return the OlmMachine only if {@link RustCrypto#stop} has not been called.
121
- *
122
- * This allows us to better handle race conditions where the client is stopped before or during a crypto API call.
123
- *
124
- * @throws ClientStoppedError if {@link RustCrypto#stop} has been called.
125
- */
126
- getOlmMachineOrThrow() {
127
- if (this.stopped) {
128
- throw new ClientStoppedError();
129
- }
130
- return this.olmMachine;
131
- }
132
-
133
- ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
134
- //
135
- // CryptoBackend implementation
136
- //
137
- ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
138
-
139
- set globalErrorOnUnknownDevices(_v) {
140
- // Not implemented for rust crypto.
141
- }
142
- get globalErrorOnUnknownDevices() {
143
- // Not implemented for rust crypto.
144
- return false;
145
- }
146
- stop() {
147
- // stop() may be called multiple times, but attempting to close() the OlmMachine twice
148
- // will cause an error.
149
- if (this.stopped) {
150
- return;
151
- }
152
- this.stopped = true;
153
- this.keyClaimManager.stop();
154
- this.backupManager.stop();
155
- this.outgoingRequestsManager.stop();
156
- this.perSessionBackupDownloader.stop();
157
- this.dehydratedDeviceManager.stop();
158
-
159
- // make sure we close() the OlmMachine; doing so means that all the Rust objects will be
160
- // cleaned up; in particular, the indexeddb connections will be closed, which means they
161
- // can then be deleted.
162
- this.olmMachine.close();
163
- }
164
- encryptEvent(event, _room) {
165
- var _this = this;
166
- return _asyncToGenerator(function* () {
167
- var roomId = event.getRoomId();
168
- var encryptor = _this.roomEncryptors[roomId];
169
- if (!encryptor) {
170
- throw new Error("Cannot encrypt event in unconfigured room ".concat(roomId));
171
- }
172
- yield encryptor.encryptEvent(event, _this.globalBlacklistUnverifiedDevices, _this.deviceIsolationMode);
173
- })();
174
- }
175
- decryptEvent(event) {
176
- var _this2 = this;
177
- return _asyncToGenerator(function* () {
178
- var roomId = event.getRoomId();
179
- if (!roomId) {
180
- // presumably, a to-device message. These are normally decrypted in preprocessToDeviceMessages
181
- // so the fact it has come back here suggests that decryption failed.
182
- //
183
- // once we drop support for the libolm crypto implementation, we can stop passing to-device messages
184
- // through decryptEvent and hence get rid of this case.
185
- throw new Error("to-device event was not decrypted in preprocessToDeviceMessages");
186
- }
187
- return yield _this2.eventDecryptor.attemptEventDecryption(event, _this2.deviceIsolationMode);
188
- })();
189
- }
190
-
191
- /**
192
- * Implementation of (deprecated) {@link MatrixClient#getEventEncryptionInfo}.
193
- *
194
- * @param event - event to inspect
195
- */
196
- getEventEncryptionInfo(event) {
197
- var _event$getSenderKey;
198
- var ret = {};
199
- ret.senderKey = (_event$getSenderKey = event.getSenderKey()) !== null && _event$getSenderKey !== void 0 ? _event$getSenderKey : undefined;
200
- ret.algorithm = event.getWireContent().algorithm;
201
- if (!ret.senderKey || !ret.algorithm) {
202
- ret.encrypted = false;
203
- return ret;
204
- }
205
- ret.encrypted = true;
206
- ret.authenticated = true;
207
- ret.mismatchedSender = true;
208
- return ret;
209
- }
210
-
211
- /**
212
- * Implementation of {@link CryptoBackend#checkUserTrust}.
213
- *
214
- * Stub for backwards compatibility.
215
- *
216
- */
217
- checkUserTrust(userId) {
218
- return new UserVerificationStatus(false, false, false);
219
- }
220
-
221
- /**
222
- * Get the cross signing information for a given user.
223
- *
224
- * The cross-signing API is currently UNSTABLE and may change without notice.
225
- *
226
- * @param userId - the user ID to get the cross-signing info for.
227
- *
228
- * @returns the cross signing information for the user.
229
- */
230
- getStoredCrossSigningForUser(userId) {
231
- // TODO
232
- return null;
233
- }
234
-
235
- /**
236
- * This function is unneeded for the rust-crypto.
237
- * The cross signing key import and the device verification are done in {@link CryptoApi#bootstrapCrossSigning}
238
- *
239
- * The function is stub to keep the compatibility with the old crypto.
240
- * More information: https://github.com/vector-im/element-web/issues/25648
241
- *
242
- * Implementation of {@link CryptoBackend#checkOwnCrossSigningTrust}
243
- */
244
- checkOwnCrossSigningTrust() {
245
- return _asyncToGenerator(function* () {
246
- return;
247
- })();
248
- }
249
-
250
- /**
251
- * Implementation of {@link CryptoBackend#getBackupDecryptor}.
252
- */
253
- getBackupDecryptor(backupInfo, privKey) {
254
- var _this3 = this;
255
- return _asyncToGenerator(function* () {
256
- if (!(privKey instanceof Uint8Array)) {
257
- throw new Error("getBackupDecryptor: expects Uint8Array");
258
- }
259
- if (backupInfo.algorithm != "m.megolm_backup.v1.curve25519-aes-sha2") {
260
- throw new Error("getBackupDecryptor: Unsupported algorithm ".concat(backupInfo.algorithm));
261
- }
262
- var backupDecryptionKey = RustSdkCryptoJs.BackupDecryptionKey.fromBase64(encodeBase64(privKey));
263
- if (!decryptionKeyMatchesKeyBackupInfo(backupDecryptionKey, backupInfo)) {
264
- throw new Error("getBackupDecryptor: key backup on server does not match the decryption key");
265
- }
266
- return _this3.backupManager.createBackupDecryptor(backupDecryptionKey);
267
- })();
268
- }
269
-
270
- /**
271
- * Implementation of {@link CryptoBackend#importBackedUpRoomKeys}.
272
- */
273
- importBackedUpRoomKeys(keys, backupVersion, opts) {
274
- var _this4 = this;
275
- return _asyncToGenerator(function* () {
276
- return yield _this4.backupManager.importBackedUpRoomKeys(keys, backupVersion, opts);
277
- })();
278
- }
279
- /**
280
- * Implementation of {@link CryptoApi#getVersion}.
281
- */
282
- getVersion() {
283
- var versions = RustSdkCryptoJs.getVersions();
284
- return "Rust SDK ".concat(versions.matrix_sdk_crypto, " (").concat(versions.git_sha, "), Vodozemac ").concat(versions.vodozemac);
285
- }
286
-
287
- /**
288
- * Implementation of {@link CryptoApi#setDeviceIsolationMode}.
289
- */
290
- setDeviceIsolationMode(isolationMode) {
291
- this.deviceIsolationMode = isolationMode;
292
- }
293
-
294
- /**
295
- * Implementation of {@link CryptoApi#isEncryptionEnabledInRoom}.
296
- */
297
- isEncryptionEnabledInRoom(roomId) {
298
- var _this5 = this;
299
- return _asyncToGenerator(function* () {
300
- var roomSettings = yield _this5.olmMachine.getRoomSettings(new RustSdkCryptoJs.RoomId(roomId));
301
- return Boolean(roomSettings === null || roomSettings === void 0 ? void 0 : roomSettings.algorithm);
302
- })();
303
- }
304
-
305
- /**
306
- * Implementation of {@link CryptoApi#getOwnDeviceKeys}.
307
- */
308
- getOwnDeviceKeys() {
309
- var _this6 = this;
310
- return _asyncToGenerator(function* () {
311
- var keys = _this6.olmMachine.identityKeys;
312
- return {
313
- ed25519: keys.ed25519.toBase64(),
314
- curve25519: keys.curve25519.toBase64()
315
- };
316
- })();
317
- }
318
- prepareToEncrypt(room) {
319
- var encryptor = this.roomEncryptors[room.roomId];
320
- if (encryptor) {
321
- encryptor.prepareForEncryption(this.globalBlacklistUnverifiedDevices, this.deviceIsolationMode);
322
- }
323
- }
324
- forceDiscardSession(roomId) {
325
- var _this$roomEncryptors$;
326
- return (_this$roomEncryptors$ = this.roomEncryptors[roomId]) === null || _this$roomEncryptors$ === void 0 ? void 0 : _this$roomEncryptors$.forceDiscardSession();
327
- }
328
- exportRoomKeys() {
329
- var _this7 = this;
330
- return _asyncToGenerator(function* () {
331
- var raw = yield _this7.olmMachine.exportRoomKeys(() => true);
332
- return JSON.parse(raw);
333
- })();
334
- }
335
- exportRoomKeysAsJson() {
336
- var _this8 = this;
337
- return _asyncToGenerator(function* () {
338
- return yield _this8.olmMachine.exportRoomKeys(() => true);
339
- })();
340
- }
341
- importRoomKeys(keys, opts) {
342
- var _this9 = this;
343
- return _asyncToGenerator(function* () {
344
- return yield _this9.backupManager.importRoomKeys(keys, opts);
345
- })();
346
- }
347
- importRoomKeysAsJson(keys, opts) {
348
- var _this10 = this;
349
- return _asyncToGenerator(function* () {
350
- return yield _this10.backupManager.importRoomKeysAsJson(keys, opts);
351
- })();
352
- }
353
-
354
- /**
355
- * Implementation of {@link CryptoApi.userHasCrossSigningKeys}.
356
- */
357
- userHasCrossSigningKeys() {
358
- var _arguments = arguments,
359
- _this11 = this;
360
- return _asyncToGenerator(function* () {
361
- var userId = _arguments.length > 0 && _arguments[0] !== undefined ? _arguments[0] : _this11.userId;
362
- var downloadUncached = _arguments.length > 1 && _arguments[1] !== undefined ? _arguments[1] : false;
363
- // TODO: could probably do with a more efficient way of doing this than returning the whole set and searching
364
- var rustTrackedUsers = yield _this11.olmMachine.trackedUsers();
365
- var rustTrackedUser;
366
- for (var u of rustTrackedUsers) {
367
- if (userId === u.toString()) {
368
- rustTrackedUser = u;
369
- break;
370
- }
371
- }
372
- if (rustTrackedUser !== undefined) {
373
- if (userId === _this11.userId) {
374
- /* make sure we have an *up-to-date* idea of the user's cross-signing keys. This is important, because if we
375
- * return "false" here, we will end up generating new cross-signing keys and replacing the existing ones.
376
- */
377
- var request = _this11.olmMachine.queryKeysForUsers(
378
- // clone as rust layer will take ownership and it's reused later
379
- [rustTrackedUser.clone()]);
380
- yield _this11.outgoingRequestProcessor.makeOutgoingRequest(request);
381
- }
382
- var userIdentity = yield _this11.olmMachine.getIdentity(rustTrackedUser);
383
- userIdentity === null || userIdentity === void 0 || userIdentity.free();
384
- return userIdentity !== undefined;
385
- } else if (downloadUncached) {
386
- var _keyResult$master_key;
387
- // Download the cross signing keys and check if the master key is available
388
- var keyResult = yield _this11.downloadDeviceList(new Set([userId]));
389
- var keys = (_keyResult$master_key = keyResult.master_keys) === null || _keyResult$master_key === void 0 ? void 0 : _keyResult$master_key[userId];
390
-
391
- // No master key
392
- if (!keys) return false;
393
-
394
- // `keys` is an object with { [`ed25519:${pubKey}`]: pubKey }
395
- // We assume only a single key, and we want the bare form without type
396
- // prefix, so we select the values.
397
- return Boolean(Object.values(keys.keys)[0]);
398
- } else {
399
- return false;
400
- }
401
- })();
402
- }
403
-
404
- /**
405
- * Get the device information for the given list of users.
406
- *
407
- * @param userIds - The users to fetch.
408
- * @param downloadUncached - If true, download the device list for users whose device list we are not
409
- * currently tracking. Defaults to false, in which case such users will not appear at all in the result map.
410
- *
411
- * @returns A map `{@link DeviceMap}`.
412
- */
413
- getUserDeviceInfo(userIds) {
414
- var _arguments2 = arguments,
415
- _this12 = this;
416
- return _asyncToGenerator(function* () {
417
- var downloadUncached = _arguments2.length > 1 && _arguments2[1] !== undefined ? _arguments2[1] : false;
418
- var deviceMapByUserId = new Map();
419
- var rustTrackedUsers = yield _this12.getOlmMachineOrThrow().trackedUsers();
420
-
421
- // Convert RustSdkCryptoJs.UserId to a `Set<string>`
422
- var trackedUsers = new Set();
423
- rustTrackedUsers.forEach(rustUserId => trackedUsers.add(rustUserId.toString()));
424
-
425
- // Keep untracked user to download their keys after
426
- var untrackedUsers = new Set();
427
- for (var _userId of userIds) {
428
- // if this is a tracked user, we can just fetch the device list from the rust-sdk
429
- // (NB: this is probably ok even if we race with a leave event such that we stop tracking the user's
430
- // devices: the rust-sdk will return the last-known device list, which will be good enough.)
431
- if (trackedUsers.has(_userId)) {
432
- deviceMapByUserId.set(_userId, yield _this12.getUserDevices(_userId));
433
- } else {
434
- untrackedUsers.add(_userId);
435
- }
436
- }
437
-
438
- // for any users whose device lists we are not tracking, fall back to downloading the device list
439
- // over HTTP.
440
- if (downloadUncached && untrackedUsers.size >= 1) {
441
- var queryResult = yield _this12.downloadDeviceList(untrackedUsers);
442
- Object.entries(queryResult.device_keys).forEach(_ref => {
443
- var [userId, deviceKeys] = _ref;
444
- return deviceMapByUserId.set(userId, deviceKeysToDeviceMap(deviceKeys));
445
- });
446
- }
447
- return deviceMapByUserId;
448
- })();
449
- }
450
-
451
- /**
452
- * Get the device list for the given user from the olm machine
453
- * @param userId - Rust SDK UserId
454
- */
455
- getUserDevices(userId) {
456
- var _this13 = this;
457
- return _asyncToGenerator(function* () {
458
- var rustUserId = new RustSdkCryptoJs.UserId(userId);
459
-
460
- // For reasons I don't really understand, the Javascript FinalizationRegistry doesn't seem to run the
461
- // registered callbacks when `userDevices` goes out of scope, nor when the individual devices in the array
462
- // returned by `userDevices.devices` do so.
463
- //
464
- // This is particularly problematic, because each of those structures holds a reference to the
465
- // VerificationMachine, which in turn holds a reference to the IndexeddbCryptoStore. Hence, we end up leaking
466
- // open connections to the crypto store, which means the store can't be deleted on logout.
467
- //
468
- // To fix this, we explicitly call `.free` on each of the objects, which tells the rust code to drop the
469
- // allocated memory and decrement the refcounts for the crypto store.
470
-
471
- // Wait for up to a second for any in-flight device list requests to complete.
472
- // The reason for this isn't so much to avoid races (some level of raciness is
473
- // inevitable for this method) but to make testing easier.
474
- var userDevices = yield _this13.olmMachine.getUserDevices(rustUserId, 1);
475
- try {
476
- var deviceArray = userDevices.devices();
477
- try {
478
- return new Map(deviceArray.map(device => [device.deviceId.toString(), rustDeviceToJsDevice(device, rustUserId)]));
479
- } finally {
480
- deviceArray.forEach(d => d.free());
481
- }
482
- } finally {
483
- userDevices.free();
484
- }
485
- })();
486
- }
487
-
488
- /**
489
- * Download the given user keys by calling `/keys/query` request
490
- * @param untrackedUsers - download keys of these users
491
- */
492
- downloadDeviceList(untrackedUsers) {
493
- var _this14 = this;
494
- return _asyncToGenerator(function* () {
495
- var queryBody = {
496
- device_keys: {}
497
- };
498
- untrackedUsers.forEach(user => queryBody.device_keys[user] = []);
499
- return yield _this14.http.authedRequest(Method.Post, "/_matrix/client/v3/keys/query", undefined, queryBody, {
500
- prefix: ""
501
- });
502
- })();
503
- }
504
-
505
- /**
506
- * Implementation of {@link CryptoApi#getTrustCrossSignedDevices}.
507
- */
508
- getTrustCrossSignedDevices() {
509
- return this._trustCrossSignedDevices;
510
- }
511
-
512
- /**
513
- * Implementation of {@link CryptoApi#setTrustCrossSignedDevices}.
514
- */
515
- setTrustCrossSignedDevices(val) {
516
- this._trustCrossSignedDevices = val;
517
- // TODO: legacy crypto goes through the list of known devices and emits DeviceVerificationChanged
518
- // events. Maybe we need to do the same?
519
- }
520
-
521
- /**
522
- * Mark the given device as locally verified.
523
- *
524
- * Implementation of {@link CryptoApi#setDeviceVerified}.
525
- */
526
- setDeviceVerified(userId, deviceId) {
527
- var _arguments3 = arguments,
528
- _this15 = this;
529
- return _asyncToGenerator(function* () {
530
- var verified = _arguments3.length > 2 && _arguments3[2] !== undefined ? _arguments3[2] : true;
531
- var device = yield _this15.olmMachine.getDevice(new RustSdkCryptoJs.UserId(userId), new RustSdkCryptoJs.DeviceId(deviceId));
532
- if (!device) {
533
- throw new Error("Unknown device ".concat(userId, "|").concat(deviceId));
534
- }
535
- try {
536
- yield device.setLocalTrust(verified ? RustSdkCryptoJs.LocalTrust.Verified : RustSdkCryptoJs.LocalTrust.Unset);
537
- } finally {
538
- device.free();
539
- }
540
- })();
541
- }
542
-
543
- /**
544
- * Blindly cross-sign one of our other devices.
545
- *
546
- * Implementation of {@link CryptoApi#crossSignDevice}.
547
- */
548
- crossSignDevice(deviceId) {
549
- var _this16 = this;
550
- return _asyncToGenerator(function* () {
551
- var device = yield _this16.olmMachine.getDevice(new RustSdkCryptoJs.UserId(_this16.userId), new RustSdkCryptoJs.DeviceId(deviceId));
552
- if (!device) {
553
- throw new Error("Unknown device ".concat(deviceId));
554
- }
555
- try {
556
- var outgoingRequest = yield device.verify();
557
- yield _this16.outgoingRequestProcessor.makeOutgoingRequest(outgoingRequest);
558
- } finally {
559
- device.free();
560
- }
561
- })();
562
- }
563
-
564
- /**
565
- * Implementation of {@link CryptoApi#getDeviceVerificationStatus}.
566
- */
567
- getDeviceVerificationStatus(userId, deviceId) {
568
- var _this17 = this;
569
- return _asyncToGenerator(function* () {
570
- var device = yield _this17.olmMachine.getDevice(new RustSdkCryptoJs.UserId(userId), new RustSdkCryptoJs.DeviceId(deviceId));
571
- if (!device) return null;
572
- try {
573
- return new DeviceVerificationStatus({
574
- signedByOwner: device.isCrossSignedByOwner(),
575
- crossSigningVerified: device.isCrossSigningTrusted(),
576
- localVerified: device.isLocallyTrusted(),
577
- trustCrossSignedDevices: _this17._trustCrossSignedDevices
578
- });
579
- } finally {
580
- device.free();
581
- }
582
- })();
583
- }
584
-
585
- /**
586
- * Implementation of {@link CryptoApi#getUserVerificationStatus}.
587
- */
588
- getUserVerificationStatus(userId) {
589
- var _this18 = this;
590
- return _asyncToGenerator(function* () {
591
- var userIdentity = yield _this18.getOlmMachineOrThrow().getIdentity(new RustSdkCryptoJs.UserId(userId));
592
- if (userIdentity === undefined) {
593
- return new UserVerificationStatus(false, false, false);
594
- }
595
- var verified = userIdentity.isVerified();
596
- var wasVerified = userIdentity.wasPreviouslyVerified();
597
- var needsUserApproval = userIdentity instanceof RustSdkCryptoJs.UserIdentity ? userIdentity.identityNeedsUserApproval() : false;
598
- userIdentity.free();
599
- return new UserVerificationStatus(verified, wasVerified, false, needsUserApproval);
600
- })();
601
- }
602
-
603
- /**
604
- * Implementation of {@link CryptoApi#pinCurrentUserIdentity}.
605
- */
606
- pinCurrentUserIdentity(userId) {
607
- var _this19 = this;
608
- return _asyncToGenerator(function* () {
609
- var userIdentity = yield _this19.getOlmMachineOrThrow().getIdentity(new RustSdkCryptoJs.UserId(userId));
610
- if (userIdentity === undefined) {
611
- throw new Error("Cannot pin identity of unknown user");
612
- }
613
- if (userIdentity instanceof RustSdkCryptoJs.OwnUserIdentity) {
614
- throw new Error("Cannot pin identity of own user");
615
- }
616
- yield userIdentity.pinCurrentMasterKey();
617
- })();
618
- }
619
-
620
- /**
621
- * Implementation of {@link CryptoApi#isCrossSigningReady}
622
- */
623
- isCrossSigningReady() {
624
- var _this20 = this;
625
- return _asyncToGenerator(function* () {
626
- var {
627
- privateKeysInSecretStorage,
628
- privateKeysCachedLocally
629
- } = yield _this20.getCrossSigningStatus();
630
- var hasKeysInCache = Boolean(privateKeysCachedLocally.masterKey) && Boolean(privateKeysCachedLocally.selfSigningKey) && Boolean(privateKeysCachedLocally.userSigningKey);
631
- var identity = yield _this20.getOwnIdentity();
632
-
633
- // Cross-signing is ready if the public identity is trusted, and the private keys
634
- // are either cached, or accessible via secret-storage.
635
- return !!(identity !== null && identity !== void 0 && identity.isVerified()) && (hasKeysInCache || privateKeysInSecretStorage);
636
- })();
637
- }
638
-
639
- /**
640
- * Implementation of {@link CryptoApi#getCrossSigningKeyId}
641
- */
642
- getCrossSigningKeyId() {
643
- var _arguments4 = arguments,
644
- _this21 = this;
645
- return _asyncToGenerator(function* () {
646
- var type = _arguments4.length > 0 && _arguments4[0] !== undefined ? _arguments4[0] : CrossSigningKey.Master;
647
- var userIdentity = yield _this21.olmMachine.getIdentity(new RustSdkCryptoJs.UserId(_this21.userId));
648
- if (!userIdentity) {
649
- // The public keys are not available on this device
650
- return null;
651
- }
652
- try {
653
- var crossSigningStatus = yield _this21.olmMachine.crossSigningStatus();
654
- var privateKeysOnDevice = crossSigningStatus.hasMaster && crossSigningStatus.hasUserSigning && crossSigningStatus.hasSelfSigning;
655
- if (!privateKeysOnDevice) {
656
- // The private keys are not available on this device
657
- return null;
658
- }
659
- if (!userIdentity.isVerified()) {
660
- // We have both public and private keys, but they don't match!
661
- return null;
662
- }
663
- var key;
664
- switch (type) {
665
- case CrossSigningKey.Master:
666
- key = userIdentity.masterKey;
667
- break;
668
- case CrossSigningKey.SelfSigning:
669
- key = userIdentity.selfSigningKey;
670
- break;
671
- case CrossSigningKey.UserSigning:
672
- key = userIdentity.userSigningKey;
673
- break;
674
- default:
675
- // Unknown type
676
- return null;
677
- }
678
- var parsedKey = JSON.parse(key);
679
- // `keys` is an object with { [`ed25519:${pubKey}`]: pubKey }
680
- // We assume only a single key, and we want the bare form without type
681
- // prefix, so we select the values.
682
- return Object.values(parsedKey.keys)[0];
683
- } finally {
684
- userIdentity.free();
685
- }
686
- })();
687
- }
688
-
689
- /**
690
- * Implementation of {@link CryptoApi#bootstrapCrossSigning}
691
- */
692
- bootstrapCrossSigning(opts) {
693
- var _this22 = this;
694
- return _asyncToGenerator(function* () {
695
- yield _this22.crossSigningIdentity.bootstrapCrossSigning(opts);
696
- })();
697
- }
698
-
699
- /**
700
- * Implementation of {@link CryptoApi#isSecretStorageReady}
701
- */
702
- isSecretStorageReady() {
703
- var _this23 = this;
704
- return _asyncToGenerator(function* () {
705
- // make sure that the cross-signing keys are stored
706
- var secretsToCheck = ["m.cross_signing.master", "m.cross_signing.user_signing", "m.cross_signing.self_signing"];
707
-
708
- // if key backup is active, we also need to check that the backup decryption key is stored
709
- var keyBackupEnabled = (yield _this23.backupManager.getActiveBackupVersion()) != null;
710
- if (keyBackupEnabled) {
711
- secretsToCheck.push("m.megolm_backup.v1");
712
- }
713
- return secretStorageCanAccessSecrets(_this23.secretStorage, secretsToCheck);
714
- })();
715
- }
716
-
717
- /**
718
- * Implementation of {@link CryptoApi#bootstrapSecretStorage}
719
- */
720
- bootstrapSecretStorage() {
721
- var _arguments5 = arguments,
722
- _this24 = this;
723
- return _asyncToGenerator(function* () {
724
- var {
725
- createSecretStorageKey,
726
- setupNewSecretStorage,
727
- setupNewKeyBackup
728
- } = _arguments5.length > 0 && _arguments5[0] !== undefined ? _arguments5[0] : {};
729
- // If an AES Key is already stored in the secret storage and setupNewSecretStorage is not set
730
- // we don't want to create a new key
731
- var isNewSecretStorageKeyNeeded = setupNewSecretStorage || !(yield _this24.secretStorageHasAESKey());
732
- if (isNewSecretStorageKeyNeeded) {
733
- if (!createSecretStorageKey) {
734
- throw new Error("unable to create a new secret storage key, createSecretStorageKey is not set");
735
- }
736
-
737
- // Create a new storage key and add it to secret storage
738
- _this24.logger.info("bootstrapSecretStorage: creating new secret storage key");
739
- var recoveryKey = yield createSecretStorageKey();
740
- if (!recoveryKey) {
741
- throw new Error("createSecretStorageKey() callback did not return a secret storage key");
742
- }
743
- yield _this24.addSecretStorageKeyToSecretStorage(recoveryKey);
744
- }
745
- var crossSigningStatus = yield _this24.olmMachine.crossSigningStatus();
746
- var hasPrivateKeys = crossSigningStatus.hasMaster && crossSigningStatus.hasSelfSigning && crossSigningStatus.hasUserSigning;
747
-
748
- // If we have cross-signing private keys cached, store them in secret
749
- // storage if they are not there already.
750
- if (hasPrivateKeys && (isNewSecretStorageKeyNeeded || !(yield secretStorageContainsCrossSigningKeys(_this24.secretStorage)))) {
751
- _this24.logger.info("bootstrapSecretStorage: cross-signing keys not yet exported; doing so now.");
752
- var crossSigningPrivateKeys = yield _this24.olmMachine.exportCrossSigningKeys();
753
- if (!crossSigningPrivateKeys.masterKey) {
754
- throw new Error("missing master key in cross signing private keys");
755
- }
756
- if (!crossSigningPrivateKeys.userSigningKey) {
757
- throw new Error("missing user signing key in cross signing private keys");
758
- }
759
- if (!crossSigningPrivateKeys.self_signing_key) {
760
- throw new Error("missing self signing key in cross signing private keys");
761
- }
762
- yield _this24.secretStorage.store("m.cross_signing.master", crossSigningPrivateKeys.masterKey);
763
- yield _this24.secretStorage.store("m.cross_signing.user_signing", crossSigningPrivateKeys.userSigningKey);
764
- yield _this24.secretStorage.store("m.cross_signing.self_signing", crossSigningPrivateKeys.self_signing_key);
765
- }
766
- if (setupNewKeyBackup) {
767
- yield _this24.resetKeyBackup();
768
- }
769
- })();
770
- }
771
-
772
- /**
773
- * Add the secretStorage key to the secret storage
774
- * - The secret storage key must have the `keyInfo` field filled
775
- * - The secret storage key is set as the default key of the secret storage
776
- * - Call `cryptoCallbacks.cacheSecretStorageKey` when done
777
- *
778
- * @param secretStorageKey - The secret storage key to add in the secret storage.
779
- */
780
- addSecretStorageKeyToSecretStorage(secretStorageKey) {
781
- var _this25 = this;
782
- return _asyncToGenerator(function* () {
783
- var _secretStorageKey$key, _secretStorageKey$key2, _this25$cryptoCallbac, _this25$cryptoCallbac2;
784
- var secretStorageKeyObject = yield _this25.secretStorage.addKey(SECRET_STORAGE_ALGORITHM_V1_AES, {
785
- passphrase: (_secretStorageKey$key = secretStorageKey.keyInfo) === null || _secretStorageKey$key === void 0 ? void 0 : _secretStorageKey$key.passphrase,
786
- name: (_secretStorageKey$key2 = secretStorageKey.keyInfo) === null || _secretStorageKey$key2 === void 0 ? void 0 : _secretStorageKey$key2.name,
787
- key: secretStorageKey.privateKey
788
- });
789
- yield _this25.secretStorage.setDefaultKeyId(secretStorageKeyObject.keyId);
790
- (_this25$cryptoCallbac = (_this25$cryptoCallbac2 = _this25.cryptoCallbacks).cacheSecretStorageKey) === null || _this25$cryptoCallbac === void 0 || _this25$cryptoCallbac.call(_this25$cryptoCallbac2, secretStorageKeyObject.keyId, secretStorageKeyObject.keyInfo, secretStorageKey.privateKey);
791
- })();
792
- }
793
-
794
- /**
795
- * Check if a secret storage AES Key is already added in secret storage
796
- *
797
- * @returns True if an AES key is in the secret storage
798
- */
799
- secretStorageHasAESKey() {
800
- var _this26 = this;
801
- return _asyncToGenerator(function* () {
802
- // See if we already have an AES secret-storage key.
803
- var secretStorageKeyTuple = yield _this26.secretStorage.getKey();
804
- if (!secretStorageKeyTuple) return false;
805
- var [, keyInfo] = secretStorageKeyTuple;
806
-
807
- // Check if the key is an AES key
808
- return keyInfo.algorithm === SECRET_STORAGE_ALGORITHM_V1_AES;
809
- })();
810
- }
811
-
812
- /**
813
- * Implementation of {@link CryptoApi#getCrossSigningStatus}
814
- */
815
- getCrossSigningStatus() {
816
- var _this27 = this;
817
- return _asyncToGenerator(function* () {
818
- var userIdentity = yield _this27.getOlmMachineOrThrow().getIdentity(new RustSdkCryptoJs.UserId(_this27.userId));
819
- var publicKeysOnDevice = Boolean(userIdentity === null || userIdentity === void 0 ? void 0 : userIdentity.masterKey) && Boolean(userIdentity === null || userIdentity === void 0 ? void 0 : userIdentity.selfSigningKey) && Boolean(userIdentity === null || userIdentity === void 0 ? void 0 : userIdentity.userSigningKey);
820
- userIdentity === null || userIdentity === void 0 || userIdentity.free();
821
- var privateKeysInSecretStorage = yield secretStorageContainsCrossSigningKeys(_this27.secretStorage);
822
- var crossSigningStatus = yield _this27.getOlmMachineOrThrow().crossSigningStatus();
823
- return {
824
- publicKeysOnDevice,
825
- privateKeysInSecretStorage,
826
- privateKeysCachedLocally: {
827
- masterKey: Boolean(crossSigningStatus === null || crossSigningStatus === void 0 ? void 0 : crossSigningStatus.hasMaster),
828
- userSigningKey: Boolean(crossSigningStatus === null || crossSigningStatus === void 0 ? void 0 : crossSigningStatus.hasUserSigning),
829
- selfSigningKey: Boolean(crossSigningStatus === null || crossSigningStatus === void 0 ? void 0 : crossSigningStatus.hasSelfSigning)
830
- }
831
- };
832
- })();
833
- }
834
-
835
- /**
836
- * Implementation of {@link CryptoApi#createRecoveryKeyFromPassphrase}
837
- */
838
- createRecoveryKeyFromPassphrase(password) {
839
- var _this28 = this;
840
- return _asyncToGenerator(function* () {
841
- if (password) {
842
- // Generate the key from the passphrase
843
- // first we generate a random salt
844
- var salt = randomString(32);
845
- // then we derive the key from the passphrase
846
- var recoveryKey = yield deriveRecoveryKeyFromPassphrase(password, salt, _this28.RECOVERY_KEY_DERIVATION_ITERATIONS);
847
- return {
848
- keyInfo: {
849
- passphrase: {
850
- algorithm: "m.pbkdf2",
851
- iterations: _this28.RECOVERY_KEY_DERIVATION_ITERATIONS,
852
- salt
853
- }
854
- },
855
- privateKey: recoveryKey,
856
- encodedPrivateKey: encodeRecoveryKey(recoveryKey)
857
- };
858
- } else {
859
- // Using the navigator crypto API to generate the private key
860
- var key = new Uint8Array(32);
861
- globalThis.crypto.getRandomValues(key);
862
- return {
863
- privateKey: key,
864
- encodedPrivateKey: encodeRecoveryKey(key)
865
- };
866
- }
867
- })();
868
- }
869
-
870
- /**
871
- * Implementation of {@link CryptoApi#getEncryptionInfoForEvent}.
872
- */
873
- getEncryptionInfoForEvent(event) {
874
- var _this29 = this;
875
- return _asyncToGenerator(function* () {
876
- return _this29.eventDecryptor.getEncryptionInfoForEvent(event);
877
- })();
878
- }
879
-
880
- /**
881
- * Returns to-device verification requests that are already in progress for the given user id.
882
- *
883
- * Implementation of {@link CryptoApi#getVerificationRequestsToDeviceInProgress}
884
- *
885
- * @param userId - the ID of the user to query
886
- *
887
- * @returns the VerificationRequests that are in progress
888
- */
889
- getVerificationRequestsToDeviceInProgress(userId) {
890
- var requests = this.olmMachine.getVerificationRequests(new RustSdkCryptoJs.UserId(userId));
891
- return requests.filter(request => request.roomId === undefined).map(request => new RustVerificationRequest(this.olmMachine, request, this.outgoingRequestProcessor, this._supportedVerificationMethods));
892
- }
893
-
894
- /**
895
- * Finds a DM verification request that is already in progress for the given room id
896
- *
897
- * Implementation of {@link CryptoApi#findVerificationRequestDMInProgress}
898
- *
899
- * @param roomId - the room to use for verification
900
- * @param userId - search the verification request for the given user
901
- *
902
- * @returns the VerificationRequest that is in progress, if any
903
- *
904
- */
905
- findVerificationRequestDMInProgress(roomId, userId) {
906
- if (!userId) throw new Error("missing userId");
907
- var requests = this.olmMachine.getVerificationRequests(new RustSdkCryptoJs.UserId(userId));
908
-
909
- // Search for the verification request for the given room id
910
- var request = requests.find(request => {
911
- var _request$roomId;
912
- return ((_request$roomId = request.roomId) === null || _request$roomId === void 0 ? void 0 : _request$roomId.toString()) === roomId;
913
- });
914
- if (request) {
915
- return new RustVerificationRequest(this.olmMachine, request, this.outgoingRequestProcessor, this._supportedVerificationMethods);
916
- }
917
- }
918
-
919
- /**
920
- * Implementation of {@link CryptoApi#requestVerificationDM}
921
- */
922
- requestVerificationDM(userId, roomId) {
923
- var _this30 = this;
924
- return _asyncToGenerator(function* () {
925
- var userIdentity = yield _this30.olmMachine.getIdentity(new RustSdkCryptoJs.UserId(userId));
926
- if (!userIdentity) throw new Error("unknown userId ".concat(userId));
927
- try {
928
- // Transform the verification methods into rust objects
929
- var methods = _this30._supportedVerificationMethods.map(method => verificationMethodIdentifierToMethod(method));
930
- // Get the request content to send to the DM room
931
- var verificationEventContent = yield userIdentity.verificationRequestContent(methods);
932
-
933
- // Send the request content to send to the DM room
934
- var eventId = yield _this30.sendVerificationRequestContent(roomId, verificationEventContent);
935
-
936
- // Get a verification request
937
- var request = yield userIdentity.requestVerification(new RustSdkCryptoJs.RoomId(roomId), new RustSdkCryptoJs.EventId(eventId), methods);
938
- return new RustVerificationRequest(_this30.olmMachine, request, _this30.outgoingRequestProcessor, _this30._supportedVerificationMethods);
939
- } finally {
940
- userIdentity.free();
941
- }
942
- })();
943
- }
944
-
945
- /**
946
- * Send the verification content to a room
947
- * See https://spec.matrix.org/v1.7/client-server-api/#put_matrixclientv3roomsroomidsendeventtypetxnid
948
- *
949
- * Prefer to use {@link OutgoingRequestProcessor.makeOutgoingRequest} when dealing with {@link RustSdkCryptoJs.RoomMessageRequest}
950
- *
951
- * @param roomId - the targeted room
952
- * @param verificationEventContent - the request body.
953
- *
954
- * @returns the event id
955
- */
956
- sendVerificationRequestContent(roomId, verificationEventContent) {
957
- var _this31 = this;
958
- return _asyncToGenerator(function* () {
959
- var txId = randomString(32);
960
- // Send the verification request content to the DM room
961
- var {
962
- event_id: eventId
963
- } = yield _this31.http.authedRequest(Method.Put, "/_matrix/client/v3/rooms/".concat(encodeURIComponent(roomId), "/send/m.room.message/").concat(encodeURIComponent(txId)), undefined, verificationEventContent, {
964
- prefix: ""
965
- });
966
- return eventId;
967
- })();
968
- }
969
- /**
970
- * Set the verification methods we offer to the other side during an interactive verification.
971
- *
972
- * If `undefined`, we will offer all the methods supported by the Rust SDK.
973
- */
974
- setSupportedVerificationMethods(methods) {
975
- // by default, the Rust SDK does not offer `m.qr_code.scan.v1`, but we do want to offer that.
976
- this._supportedVerificationMethods = methods !== null && methods !== void 0 ? methods : ALL_VERIFICATION_METHODS;
977
- }
978
-
979
- /**
980
- * Send a verification request to our other devices.
981
- *
982
- * If a verification is already in flight, returns it. Otherwise, initiates a new one.
983
- *
984
- * Implementation of {@link CryptoApi#requestOwnUserVerification}.
985
- *
986
- * @returns a VerificationRequest when the request has been sent to the other party.
987
- */
988
- requestOwnUserVerification() {
989
- var _this32 = this;
990
- return _asyncToGenerator(function* () {
991
- var userIdentity = yield _this32.olmMachine.getIdentity(new RustSdkCryptoJs.UserId(_this32.userId));
992
- if (userIdentity === undefined) {
993
- throw new Error("cannot request verification for this device when there is no existing cross-signing key");
994
- }
995
- try {
996
- var [request, outgoingRequest] = yield userIdentity.requestVerification(_this32._supportedVerificationMethods.map(verificationMethodIdentifierToMethod));
997
- yield _this32.outgoingRequestProcessor.makeOutgoingRequest(outgoingRequest);
998
- return new RustVerificationRequest(_this32.olmMachine, request, _this32.outgoingRequestProcessor, _this32._supportedVerificationMethods);
999
- } finally {
1000
- userIdentity.free();
1001
- }
1002
- })();
1003
- }
1004
-
1005
- /**
1006
- * Request an interactive verification with the given device.
1007
- *
1008
- * If a verification is already in flight, returns it. Otherwise, initiates a new one.
1009
- *
1010
- * Implementation of {@link CryptoApi#requestDeviceVerification}.
1011
- *
1012
- * @param userId - ID of the owner of the device to verify
1013
- * @param deviceId - ID of the device to verify
1014
- *
1015
- * @returns a VerificationRequest when the request has been sent to the other party.
1016
- */
1017
- requestDeviceVerification(userId, deviceId) {
1018
- var _this33 = this;
1019
- return _asyncToGenerator(function* () {
1020
- var device = yield _this33.olmMachine.getDevice(new RustSdkCryptoJs.UserId(userId), new RustSdkCryptoJs.DeviceId(deviceId));
1021
- if (!device) {
1022
- throw new Error("Not a known device");
1023
- }
1024
- try {
1025
- var [request, outgoingRequest] = device.requestVerification(_this33._supportedVerificationMethods.map(verificationMethodIdentifierToMethod));
1026
- yield _this33.outgoingRequestProcessor.makeOutgoingRequest(outgoingRequest);
1027
- return new RustVerificationRequest(_this33.olmMachine, request, _this33.outgoingRequestProcessor, _this33._supportedVerificationMethods);
1028
- } finally {
1029
- device.free();
1030
- }
1031
- })();
1032
- }
1033
-
1034
- /**
1035
- * Fetch the backup decryption key we have saved in our store.
1036
- *
1037
- * Implementation of {@link CryptoApi#getSessionBackupPrivateKey}.
1038
- *
1039
- * @returns the key, if any, or null
1040
- */
1041
- getSessionBackupPrivateKey() {
1042
- var _this34 = this;
1043
- return _asyncToGenerator(function* () {
1044
- var backupKeys = yield _this34.olmMachine.getBackupKeys();
1045
- if (!backupKeys.decryptionKey) return null;
1046
- return Buffer.from(backupKeys.decryptionKey.toBase64(), "base64");
1047
- })();
1048
- }
1049
-
1050
- /**
1051
- * Store the backup decryption key.
1052
- *
1053
- * Implementation of {@link CryptoApi#storeSessionBackupPrivateKey}.
1054
- *
1055
- * @param key - the backup decryption key
1056
- * @param version - the backup version for this key.
1057
- */
1058
- storeSessionBackupPrivateKey(key, version) {
1059
- var _this35 = this;
1060
- return _asyncToGenerator(function* () {
1061
- var base64Key = encodeBase64(key);
1062
- if (!version) {
1063
- throw new Error("storeSessionBackupPrivateKey: version is required");
1064
- }
1065
- yield _this35.backupManager.saveBackupDecryptionKey(RustSdkCryptoJs.BackupDecryptionKey.fromBase64(base64Key), version);
1066
- })();
1067
- }
1068
-
1069
- /**
1070
- * Implementation of {@link CryptoApi#loadSessionBackupPrivateKeyFromSecretStorage}.
1071
- */
1072
- loadSessionBackupPrivateKeyFromSecretStorage() {
1073
- var _this36 = this;
1074
- return _asyncToGenerator(function* () {
1075
- var backupKey = yield _this36.secretStorage.get("m.megolm_backup.v1");
1076
- if (!backupKey) {
1077
- throw new Error("loadSessionBackupPrivateKeyFromSecretStorage: missing decryption key in secret storage");
1078
- }
1079
- var keyBackupInfo = yield _this36.backupManager.getServerBackupInfo();
1080
- if (!keyBackupInfo || !keyBackupInfo.version) {
1081
- throw new Error("loadSessionBackupPrivateKeyFromSecretStorage: unable to get backup version");
1082
- }
1083
- var backupDecryptionKey = RustSdkCryptoJs.BackupDecryptionKey.fromBase64(backupKey);
1084
- if (!decryptionKeyMatchesKeyBackupInfo(backupDecryptionKey, keyBackupInfo)) {
1085
- throw new Error("loadSessionBackupPrivateKeyFromSecretStorage: decryption key does not match backup info");
1086
- }
1087
- yield _this36.backupManager.saveBackupDecryptionKey(backupDecryptionKey, keyBackupInfo.version);
1088
- })();
1089
- }
1090
-
1091
- /**
1092
- * Get the current status of key backup.
1093
- *
1094
- * Implementation of {@link CryptoApi#getActiveSessionBackupVersion}.
1095
- */
1096
- getActiveSessionBackupVersion() {
1097
- var _this37 = this;
1098
- return _asyncToGenerator(function* () {
1099
- return yield _this37.backupManager.getActiveBackupVersion();
1100
- })();
1101
- }
1102
-
1103
- /**
1104
- * Implementation of {@link CryptoApi#getKeyBackupInfo}.
1105
- */
1106
- getKeyBackupInfo() {
1107
- var _this38 = this;
1108
- return _asyncToGenerator(function* () {
1109
- return (yield _this38.backupManager.getServerBackupInfo()) || null;
1110
- })();
1111
- }
1112
-
1113
- /**
1114
- * Determine if a key backup can be trusted.
1115
- *
1116
- * Implementation of {@link CryptoApi#isKeyBackupTrusted}.
1117
- */
1118
- isKeyBackupTrusted(info) {
1119
- var _this39 = this;
1120
- return _asyncToGenerator(function* () {
1121
- return yield _this39.backupManager.isKeyBackupTrusted(info);
1122
- })();
1123
- }
1124
-
1125
- /**
1126
- * Force a re-check of the key backup and enable/disable it as appropriate.
1127
- *
1128
- * Implementation of {@link CryptoApi#checkKeyBackupAndEnable}.
1129
- */
1130
- checkKeyBackupAndEnable() {
1131
- var _this40 = this;
1132
- return _asyncToGenerator(function* () {
1133
- return yield _this40.backupManager.checkKeyBackupAndEnable(true);
1134
- })();
1135
- }
1136
-
1137
- /**
1138
- * Implementation of {@link CryptoApi#deleteKeyBackupVersion}.
1139
- */
1140
- deleteKeyBackupVersion(version) {
1141
- var _this41 = this;
1142
- return _asyncToGenerator(function* () {
1143
- yield _this41.backupManager.deleteKeyBackupVersion(version);
1144
- })();
1145
- }
1146
-
1147
- /**
1148
- * Implementation of {@link CryptoApi#resetKeyBackup}.
1149
- */
1150
- resetKeyBackup() {
1151
- var _this42 = this;
1152
- return _asyncToGenerator(function* () {
1153
- var backupInfo = yield _this42.backupManager.setupKeyBackup(o => _this42.signObject(o));
1154
-
1155
- // we want to store the private key in 4S
1156
- // need to check if 4S is set up?
1157
- if (yield _this42.secretStorageHasAESKey()) {
1158
- yield _this42.secretStorage.store("m.megolm_backup.v1", backupInfo.decryptionKey.toBase64());
1159
- }
1160
-
1161
- // we can check and start async
1162
- _this42.checkKeyBackupAndEnable();
1163
- })();
1164
- }
1165
-
1166
- /**
1167
- * Signs the given object with the current device and current identity (if available).
1168
- * As defined in {@link https://spec.matrix.org/v1.8/appendices/#signing-json | Signing JSON}.
1169
- *
1170
- * Helper for {@link RustCrypto#resetKeyBackup}.
1171
- *
1172
- * @param obj - The object to sign
1173
- */
1174
- signObject(obj) {
1175
- var _this43 = this;
1176
- return _asyncToGenerator(function* () {
1177
- var sigs = new Map(Object.entries(obj.signatures || {}));
1178
- var unsigned = obj.unsigned;
1179
- delete obj.signatures;
1180
- delete obj.unsigned;
1181
- var userSignatures = sigs.get(_this43.userId) || {};
1182
- var canonalizedJson = anotherjson.stringify(obj);
1183
- var signatures = yield _this43.olmMachine.sign(canonalizedJson);
1184
- var map = JSON.parse(signatures.asJSON());
1185
- sigs.set(_this43.userId, _objectSpread(_objectSpread({}, userSignatures), map[_this43.userId]));
1186
- if (unsigned !== undefined) obj.unsigned = unsigned;
1187
- obj.signatures = Object.fromEntries(sigs.entries());
1188
- })();
1189
- }
1190
-
1191
- /**
1192
- * Implementation of {@link CryptoApi#restoreKeyBackupWithPassphrase}.
1193
- */
1194
- restoreKeyBackupWithPassphrase(passphrase, opts) {
1195
- var _this44 = this;
1196
- return _asyncToGenerator(function* () {
1197
- var backupInfo = yield _this44.backupManager.getServerBackupInfo();
1198
- if (!(backupInfo !== null && backupInfo !== void 0 && backupInfo.version)) {
1199
- throw new Error("No backup info available");
1200
- }
1201
- var privateKey = yield keyFromAuthData(backupInfo.auth_data, passphrase);
1202
-
1203
- // Cache the key
1204
- yield _this44.storeSessionBackupPrivateKey(privateKey, backupInfo.version);
1205
- return _this44.restoreKeyBackup(opts);
1206
- })();
1207
- }
1208
-
1209
- /**
1210
- * Implementation of {@link CryptoApi#restoreKeyBackup}.
1211
- */
1212
- restoreKeyBackup(opts) {
1213
- var _this45 = this;
1214
- return _asyncToGenerator(function* () {
1215
- // Get the decryption key from the crypto store
1216
- var backupKeys = yield _this45.olmMachine.getBackupKeys();
1217
- var {
1218
- decryptionKey,
1219
- backupVersion
1220
- } = backupKeys;
1221
- if (!decryptionKey || !backupVersion) throw new Error("No decryption key found in crypto store");
1222
- var decodedDecryptionKey = decodeBase64(decryptionKey.toBase64());
1223
- var backupInfo = yield _this45.backupManager.requestKeyBackupVersion(backupVersion);
1224
- if (!backupInfo) throw new Error("Backup version to restore ".concat(backupVersion, " not found on server"));
1225
- var backupDecryptor = yield _this45.getBackupDecryptor(backupInfo, decodedDecryptionKey);
1226
- try {
1227
- var _opts$progressCallbac;
1228
- opts === null || opts === void 0 || (_opts$progressCallbac = opts.progressCallback) === null || _opts$progressCallbac === void 0 || _opts$progressCallbac.call(opts, {
1229
- stage: "fetch"
1230
- });
1231
- return yield _this45.backupManager.restoreKeyBackup(backupVersion, backupDecryptor, opts);
1232
- } finally {
1233
- // Free to avoid to keep in memory the decryption key stored in it. To avoid to exposing it to an attacker.
1234
- backupDecryptor.free();
1235
- }
1236
- })();
1237
- }
1238
-
1239
- /**
1240
- * Implementation of {@link CryptoApi#isDehydrationSupported}.
1241
- */
1242
- isDehydrationSupported() {
1243
- var _this46 = this;
1244
- return _asyncToGenerator(function* () {
1245
- return yield _this46.dehydratedDeviceManager.isSupported();
1246
- })();
1247
- }
1248
-
1249
- /**
1250
- * Implementation of {@link CryptoApi#startDehydration}.
1251
- */
1252
- startDehydration(createNewKey) {
1253
- var _this47 = this;
1254
- return _asyncToGenerator(function* () {
1255
- if (!(yield _this47.isCrossSigningReady()) || !(yield _this47.isSecretStorageReady())) {
1256
- throw new Error("Device dehydration requires cross-signing and secret storage to be set up");
1257
- }
1258
- return yield _this47.dehydratedDeviceManager.start(createNewKey);
1259
- })();
1260
- }
1261
-
1262
- /**
1263
- * Implementation of {@link CryptoApi#importSecretsBundle}.
1264
- */
1265
- importSecretsBundle(secrets) {
1266
- var _this48 = this;
1267
- return _asyncToGenerator(function* () {
1268
- var secretsBundle = RustSdkCryptoJs.SecretsBundle.from_json(secrets);
1269
- yield _this48.getOlmMachineOrThrow().importSecretsBundle(secretsBundle); // this method frees the SecretsBundle
1270
- })();
1271
- }
1272
-
1273
- /**
1274
- * Implementation of {@link CryptoApi#exportSecretsBundle}.
1275
- */
1276
- exportSecretsBundle() {
1277
- var _this49 = this;
1278
- return _asyncToGenerator(function* () {
1279
- var secretsBundle = yield _this49.getOlmMachineOrThrow().exportSecretsBundle();
1280
- var secrets = secretsBundle.to_json();
1281
- secretsBundle.free();
1282
- return secrets;
1283
- })();
1284
- }
1285
-
1286
- /**
1287
- * Implementation of {@link CryptoApi#encryptToDeviceMessages}.
1288
- */
1289
- encryptToDeviceMessages(eventType, devices, payload) {
1290
- var _this50 = this;
1291
- return _asyncToGenerator(function* () {
1292
- var logger = new LogSpan(_this50.logger, "encryptToDeviceMessages");
1293
- var uniqueUsers = new Set(devices.map(_ref2 => {
1294
- var {
1295
- userId
1296
- } = _ref2;
1297
- return userId;
1298
- }));
1299
-
1300
- // This will ensure we have Olm sessions for all of the users' devices.
1301
- // However, we only care about some of the devices.
1302
- // So, perhaps we can optimise this later on.
1303
- yield _this50.keyClaimManager.ensureSessionsForUsers(logger, Array.from(uniqueUsers).map(userId => new RustSdkCryptoJs.UserId(userId)));
1304
- var batch = {
1305
- batch: [],
1306
- eventType: EventType.RoomMessageEncrypted
1307
- };
1308
- yield Promise.all(devices.map(/*#__PURE__*/function () {
1309
- var _ref4 = _asyncToGenerator(function* (_ref3) {
1310
- var {
1311
- userId,
1312
- deviceId
1313
- } = _ref3;
1314
- var device = yield _this50.olmMachine.getDevice(new RustSdkCryptoJs.UserId(userId), new RustSdkCryptoJs.DeviceId(deviceId));
1315
- if (device) {
1316
- var encryptedPayload = JSON.parse(yield device.encryptToDeviceEvent(eventType, payload));
1317
- batch.batch.push({
1318
- deviceId,
1319
- userId,
1320
- payload: encryptedPayload
1321
- });
1322
- } else {
1323
- _this50.logger.warn("encryptToDeviceMessages: unknown device ".concat(userId, ":").concat(deviceId));
1324
- }
1325
- });
1326
- return function (_x) {
1327
- return _ref4.apply(this, arguments);
1328
- };
1329
- }()));
1330
- return batch;
1331
- })();
1332
- }
1333
-
1334
- ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
1335
- //
1336
- // SyncCryptoCallbacks implementation
1337
- //
1338
- ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
1339
-
1340
- /**
1341
- * Apply sync changes to the olm machine
1342
- * @param events - the received to-device messages
1343
- * @param oneTimeKeysCounts - the received one time key counts
1344
- * @param unusedFallbackKeys - the received unused fallback keys
1345
- * @param devices - the received device list updates
1346
- * @returns A list of preprocessed to-device messages.
1347
- */
1348
- receiveSyncChanges(_ref5) {
1349
- var _this51 = this;
1350
- return _asyncToGenerator(function* () {
1351
- var {
1352
- events,
1353
- oneTimeKeysCounts = new Map(),
1354
- unusedFallbackKeys,
1355
- devices = new RustSdkCryptoJs.DeviceLists()
1356
- } = _ref5;
1357
- var result = yield logDuration(logger, "receiveSyncChanges", /*#__PURE__*/_asyncToGenerator(function* () {
1358
- return yield _this51.olmMachine.receiveSyncChanges(events ? JSON.stringify(events) : "[]", devices, oneTimeKeysCounts, unusedFallbackKeys);
1359
- }));
1360
-
1361
- // receiveSyncChanges returns a JSON-encoded list of decrypted to-device messages.
1362
- return JSON.parse(result);
1363
- })();
1364
- }
1365
-
1366
- /** called by the sync loop to preprocess incoming to-device messages
1367
- *
1368
- * @param events - the received to-device messages
1369
- * @returns A list of preprocessed to-device messages.
1370
- */
1371
- preprocessToDeviceMessages(events) {
1372
- var _this52 = this;
1373
- return _asyncToGenerator(function* () {
1374
- // send the received to-device messages into receiveSyncChanges. We have no info on device-list changes,
1375
- // one-time-keys, or fallback keys, so just pass empty data.
1376
- var processed = yield _this52.receiveSyncChanges({
1377
- events
1378
- });
1379
-
1380
- // look for interesting to-device messages
1381
- for (var message of processed) {
1382
- if (message.type === EventType.KeyVerificationRequest) {
1383
- var sender = message.sender;
1384
- var transactionId = message.content.transaction_id;
1385
- if (transactionId && sender) {
1386
- _this52.onIncomingKeyVerificationRequest(sender, transactionId);
1387
- }
1388
- }
1389
- }
1390
- return processed;
1391
- })();
1392
- }
1393
-
1394
- /** called by the sync loop to process one time key counts and unused fallback keys
1395
- *
1396
- * @param oneTimeKeysCounts - the received one time key counts
1397
- * @param unusedFallbackKeys - the received unused fallback keys
1398
- */
1399
- processKeyCounts(oneTimeKeysCounts, unusedFallbackKeys) {
1400
- var _this53 = this;
1401
- return _asyncToGenerator(function* () {
1402
- var mapOneTimeKeysCount = oneTimeKeysCounts && new Map(Object.entries(oneTimeKeysCounts));
1403
- var setUnusedFallbackKeys = unusedFallbackKeys && new Set(unusedFallbackKeys);
1404
- if (mapOneTimeKeysCount !== undefined || setUnusedFallbackKeys !== undefined) {
1405
- yield _this53.receiveSyncChanges({
1406
- oneTimeKeysCounts: mapOneTimeKeysCount,
1407
- unusedFallbackKeys: setUnusedFallbackKeys
1408
- });
1409
- }
1410
- })();
1411
- }
1412
-
1413
- /** called by the sync loop to process the notification that device lists have
1414
- * been changed.
1415
- *
1416
- * @param deviceLists - device_lists field from /sync
1417
- */
1418
- processDeviceLists(deviceLists) {
1419
- var _this54 = this;
1420
- return _asyncToGenerator(function* () {
1421
- var _deviceLists$changed, _deviceLists$left;
1422
- var devices = new RustSdkCryptoJs.DeviceLists((_deviceLists$changed = deviceLists.changed) === null || _deviceLists$changed === void 0 ? void 0 : _deviceLists$changed.map(userId => new RustSdkCryptoJs.UserId(userId)), (_deviceLists$left = deviceLists.left) === null || _deviceLists$left === void 0 ? void 0 : _deviceLists$left.map(userId => new RustSdkCryptoJs.UserId(userId)));
1423
- yield _this54.receiveSyncChanges({
1424
- devices
1425
- });
1426
- })();
1427
- }
1428
-
1429
- /** called by the sync loop on m.room.encrypted events
1430
- *
1431
- * @param room - in which the event was received
1432
- * @param event - encryption event to be processed
1433
- */
1434
- onCryptoEvent(room, event) {
1435
- var _this55 = this;
1436
- return _asyncToGenerator(function* () {
1437
- var config = event.getContent();
1438
- var settings = new RustSdkCryptoJs.RoomSettings();
1439
- if (config.algorithm === "m.megolm.v1.aes-sha2") {
1440
- settings.algorithm = RustSdkCryptoJs.EncryptionAlgorithm.MegolmV1AesSha2;
1441
- } else {
1442
- // Among other situations, this happens if the crypto state event is redacted.
1443
- _this55.logger.warn("Room ".concat(room.roomId, ": ignoring crypto event with invalid algorithm ").concat(config.algorithm));
1444
- return;
1445
- }
1446
- try {
1447
- settings.sessionRotationPeriodMs = config.rotation_period_ms;
1448
- settings.sessionRotationPeriodMessages = config.rotation_period_msgs;
1449
- yield _this55.olmMachine.setRoomSettings(new RustSdkCryptoJs.RoomId(room.roomId), settings);
1450
- } catch (e) {
1451
- _this55.logger.warn("Room ".concat(room.roomId, ": ignoring crypto event which caused error: ").concat(e));
1452
- return;
1453
- }
1454
-
1455
- // If we got this far, the SDK found the event acceptable.
1456
- // We need to either create or update the active RoomEncryptor.
1457
- var existingEncryptor = _this55.roomEncryptors[room.roomId];
1458
- if (existingEncryptor) {
1459
- existingEncryptor.onCryptoEvent(config);
1460
- } else {
1461
- _this55.roomEncryptors[room.roomId] = new RoomEncryptor(_this55.olmMachine, _this55.keyClaimManager, _this55.outgoingRequestsManager, room, config);
1462
- }
1463
- })();
1464
- }
1465
-
1466
- /** called by the sync loop after processing each sync.
1467
- *
1468
- * TODO: figure out something equivalent for sliding sync.
1469
- *
1470
- * @param syncState - information on the completed sync.
1471
- */
1472
- onSyncCompleted(syncState) {
1473
- // Processing the /sync may have produced new outgoing requests which need sending, so kick off the outgoing
1474
- // request loop, if it's not already running.
1475
- this.outgoingRequestsManager.doProcessOutgoingRequests().catch(e => {
1476
- this.logger.warn("onSyncCompleted: Error processing outgoing requests", e);
1477
- });
1478
- }
1479
-
1480
- /**
1481
- * Handle an incoming m.key.verification.request event, received either in-room or in a to-device message.
1482
- *
1483
- * @param sender - the sender of the event
1484
- * @param transactionId - the transaction ID for the verification. For to-device messages, this comes from the
1485
- * content of the message; for in-room messages it is the event ID.
1486
- */
1487
- onIncomingKeyVerificationRequest(sender, transactionId) {
1488
- var request = this.olmMachine.getVerificationRequest(new RustSdkCryptoJs.UserId(sender), transactionId);
1489
- if (request) {
1490
- this.emit(CryptoEvent.VerificationRequestReceived, new RustVerificationRequest(this.olmMachine, request, this.outgoingRequestProcessor, this._supportedVerificationMethods));
1491
- } else {
1492
- // There are multiple reasons this can happen; probably the most likely is that the event is an
1493
- // in-room event which is too old.
1494
- this.logger.info("Ignoring just-received verification request ".concat(transactionId, " which did not start a rust-side verification"));
1495
- }
1496
- }
1497
-
1498
- ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
1499
- //
1500
- // Other public functions
1501
- //
1502
- ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
1503
-
1504
- /** called by the MatrixClient on a room membership event
1505
- *
1506
- * @param event - The matrix event which caused this event to fire.
1507
- * @param member - The member whose RoomMember.membership changed.
1508
- * @param oldMembership - The previous membership state. Null if it's a new member.
1509
- */
1510
- onRoomMembership(event, member, oldMembership) {
1511
- var enc = this.roomEncryptors[event.getRoomId()];
1512
- if (!enc) {
1513
- // not encrypting in this room
1514
- return;
1515
- }
1516
- enc.onRoomMembership(member);
1517
- }
1518
-
1519
- /** Callback for OlmMachine.registerRoomKeyUpdatedCallback
1520
- *
1521
- * Called by the rust-sdk whenever there is an update to (megolm) room keys. We
1522
- * check if we have any events waiting for the given keys, and schedule them for
1523
- * a decryption retry if so.
1524
- *
1525
- * @param keys - details of the updated keys
1526
- */
1527
- onRoomKeysUpdated(keys) {
1528
- var _this56 = this;
1529
- return _asyncToGenerator(function* () {
1530
- for (var key of keys) {
1531
- _this56.onRoomKeyUpdated(key);
1532
- }
1533
- _this56.backupManager.maybeUploadKey();
1534
- })();
1535
- }
1536
- onRoomKeyUpdated(key) {
1537
- var _this57 = this;
1538
- if (this.stopped) return;
1539
- this.logger.debug("Got update for session ".concat(key.sessionId, " from sender ").concat(key.senderKey.toBase64(), " in ").concat(key.roomId.toString()));
1540
- var pendingList = this.eventDecryptor.getEventsPendingRoomKey(key.roomId.toString(), key.sessionId);
1541
- if (pendingList.length === 0) return;
1542
- this.logger.debug("Retrying decryption on events:", pendingList.map(e => "".concat(e.getId())));
1543
-
1544
- // Have another go at decrypting events with this key.
1545
- //
1546
- // We don't want to end up blocking the callback from Rust, which could otherwise end up dropping updates,
1547
- // so we don't wait for the decryption to complete. In any case, there is no need to wait:
1548
- // MatrixEvent.attemptDecryption ensures that there is only one decryption attempt happening at once,
1549
- // and deduplicates repeated attempts for the same event.
1550
- var _loop = function _loop(ev) {
1551
- ev.attemptDecryption(_this57, {
1552
- isRetry: true
1553
- }).catch(_e => {
1554
- _this57.logger.info("Still unable to decrypt event ".concat(ev.getId(), " after receiving key"));
1555
- });
1556
- };
1557
- for (var ev of pendingList) {
1558
- _loop(ev);
1559
- }
1560
- }
1561
-
1562
- /**
1563
- * Callback for `OlmMachine.registerRoomKeyWithheldCallback`.
1564
- *
1565
- * Called by the rust sdk whenever we are told that a key has been withheld. We see if we had any events that
1566
- * failed to decrypt for the given session, and update their status if so.
1567
- *
1568
- * @param withheld - Details of the withheld sessions.
1569
- */
1570
- onRoomKeysWithheld(withheld) {
1571
- var _this58 = this;
1572
- return _asyncToGenerator(function* () {
1573
- for (var session of withheld) {
1574
- _this58.logger.debug("Got withheld message for session ".concat(session.sessionId, " in ").concat(session.roomId.toString()));
1575
- var pendingList = _this58.eventDecryptor.getEventsPendingRoomKey(session.roomId.toString(), session.sessionId);
1576
- if (pendingList.length === 0) return;
1577
-
1578
- // The easiest way to update the status of the event is to have another go at decrypting it.
1579
- _this58.logger.debug("Retrying decryption on events:", pendingList.map(e => "".concat(e.getId())));
1580
- for (var ev of pendingList) {
1581
- ev.attemptDecryption(_this58, {
1582
- isRetry: true
1583
- }).catch(_e => {
1584
- // It's somewhat expected that we still can't decrypt here.
1585
- });
1586
- }
1587
- }
1588
- })();
1589
- }
1590
-
1591
- /**
1592
- * Callback for `OlmMachine.registerUserIdentityUpdatedCallback`
1593
- *
1594
- * Called by the rust-sdk whenever there is an update to any user's cross-signing status. We re-check their trust
1595
- * status and emit a `UserTrustStatusChanged` event, as well as a `KeysChanged` if it is our own identity that changed.
1596
- *
1597
- * @param userId - the user with the updated identity
1598
- */
1599
- onUserIdentityUpdated(userId) {
1600
- var _this59 = this;
1601
- return _asyncToGenerator(function* () {
1602
- var newVerification = yield _this59.getUserVerificationStatus(userId.toString());
1603
- _this59.emit(CryptoEvent.UserTrustStatusChanged, userId.toString(), newVerification);
1604
-
1605
- // If our own user identity has changed, we may now trust the key backup where we did not before.
1606
- // So, re-check the key backup status and enable it if available.
1607
- if (userId.toString() === _this59.userId) {
1608
- _this59.emit(CryptoEvent.KeysChanged, {});
1609
- yield _this59.checkKeyBackupAndEnable();
1610
- }
1611
- })();
1612
- }
1613
-
1614
- /**
1615
- * Callback for `OlmMachine.registerDevicesUpdatedCallback`
1616
- *
1617
- * Called when users' devices have updated. Emits `WillUpdateDevices` and `DevicesUpdated`. In the JavaScript
1618
- * crypto backend, these events are called at separate times, with `WillUpdateDevices` being emitted just before
1619
- * the devices are saved, and `DevicesUpdated` being emitted just after. But the OlmMachine only gives us
1620
- * one event, so we emit both events here.
1621
- *
1622
- * @param userIds - an array of user IDs of users whose devices have updated.
1623
- */
1624
- onDevicesUpdated(userIds) {
1625
- var _this60 = this;
1626
- return _asyncToGenerator(function* () {
1627
- _this60.emit(CryptoEvent.WillUpdateDevices, userIds, false);
1628
- _this60.emit(CryptoEvent.DevicesUpdated, userIds, false);
1629
- })();
1630
- }
1631
-
1632
- /**
1633
- * Handles secret received from the rust secret inbox.
1634
- *
1635
- * The gossipped secrets are received using the `m.secret.send` event type
1636
- * and are guaranteed to have been received over a 1-to-1 Olm
1637
- * Session from a verified device.
1638
- *
1639
- * The only secret currently handled in this way is `m.megolm_backup.v1`.
1640
- *
1641
- * @param name - the secret name
1642
- * @param value - the secret value
1643
- */
1644
- handleSecretReceived(name, value) {
1645
- var _this61 = this;
1646
- return _asyncToGenerator(function* () {
1647
- _this61.logger.debug("onReceiveSecret: Received secret ".concat(name));
1648
- if (name === "m.megolm_backup.v1") {
1649
- return yield _this61.backupManager.handleBackupSecretReceived(value);
1650
- // XXX at this point we should probably try to download the backup and import the keys,
1651
- // or at least retry for the current decryption failures?
1652
- // Maybe add some signaling when a new secret is received, and let clients handle it?
1653
- // as it's where the restore from backup APIs are exposed.
1654
- }
1655
- return false;
1656
- })();
1657
- }
1658
-
1659
- /**
1660
- * Called when a new secret is received in the rust secret inbox.
1661
- *
1662
- * Will poll the secret inbox and handle the secrets received.
1663
- *
1664
- * @param name - The name of the secret received.
1665
- */
1666
- checkSecrets(name) {
1667
- var _this62 = this;
1668
- return _asyncToGenerator(function* () {
1669
- var pendingValues = yield _this62.olmMachine.getSecretsFromInbox(name);
1670
- for (var value of pendingValues) {
1671
- if (yield _this62.handleSecretReceived(name, value)) {
1672
- // If we have a valid secret for that name there is no point of processing the other secrets values.
1673
- // It's probably the same secret shared by another device.
1674
- break;
1675
- }
1676
- }
1677
-
1678
- // Important to call this after handling the secrets as good hygiene.
1679
- yield _this62.olmMachine.deleteSecretsFromInbox(name);
1680
- })();
1681
- }
1682
-
1683
- /**
1684
- * Handle a live event received via /sync.
1685
- * See {@link ClientEventHandlerMap#event}
1686
- *
1687
- * @param event - live event
1688
- */
1689
- onLiveEventFromSync(event) {
1690
- var _this63 = this;
1691
- return _asyncToGenerator(function* () {
1692
- // Ignore state event or remote echo
1693
- // transaction_id is provided in case of remote echo {@link https://spec.matrix.org/v1.7/client-server-api/#local-echo}
1694
- if (event.isState() || !!event.getUnsigned().transaction_id) return;
1695
- var processEvent = /*#__PURE__*/function () {
1696
- var _ref7 = _asyncToGenerator(function* (evt) {
1697
- // Process only verification event
1698
- if (isVerificationEvent(event)) {
1699
- yield _this63.onKeyVerificationEvent(evt);
1700
- }
1701
- });
1702
- return function processEvent(_x2) {
1703
- return _ref7.apply(this, arguments);
1704
- };
1705
- }();
1706
-
1707
- // If the event is encrypted of in failure, we wait for decryption
1708
- if (event.isDecryptionFailure() || event.isEncrypted()) {
1709
- // 5 mins
1710
- var TIMEOUT_DELAY = 5 * 60 * 1000;
1711
-
1712
- // After 5mins, we are not expecting the event to be decrypted
1713
- var timeoutId = setTimeout(() => event.off(MatrixEventEvent.Decrypted, onDecrypted), TIMEOUT_DELAY);
1714
- var onDecrypted = (decryptedEvent, error) => {
1715
- if (error) return;
1716
- clearTimeout(timeoutId);
1717
- event.off(MatrixEventEvent.Decrypted, onDecrypted);
1718
- processEvent(decryptedEvent);
1719
- };
1720
- event.on(MatrixEventEvent.Decrypted, onDecrypted);
1721
- } else {
1722
- yield processEvent(event);
1723
- }
1724
- })();
1725
- }
1726
-
1727
- /**
1728
- * Handle an in-room key verification event.
1729
- *
1730
- * @param event - a key validation request event.
1731
- */
1732
- onKeyVerificationEvent(event) {
1733
- var _this64 = this;
1734
- return _asyncToGenerator(function* () {
1735
- var roomId = event.getRoomId();
1736
- if (!roomId) {
1737
- throw new Error("missing roomId in the event");
1738
- }
1739
- _this64.logger.debug("Incoming verification event ".concat(event.getId(), " type ").concat(event.getType(), " from ").concat(event.getSender()));
1740
- yield _this64.olmMachine.receiveVerificationEvent(JSON.stringify({
1741
- event_id: event.getId(),
1742
- type: event.getType(),
1743
- sender: event.getSender(),
1744
- state_key: event.getStateKey(),
1745
- content: event.getContent(),
1746
- origin_server_ts: event.getTs()
1747
- }), new RustSdkCryptoJs.RoomId(roomId));
1748
- if (event.getType() === EventType.RoomMessage && event.getContent().msgtype === MsgType.KeyVerificationRequest) {
1749
- _this64.onIncomingKeyVerificationRequest(event.getSender(), event.getId());
1750
- }
1751
-
1752
- // that may have caused us to queue up outgoing requests, so make sure we send them.
1753
- _this64.outgoingRequestsManager.doProcessOutgoingRequests().catch(e => {
1754
- _this64.logger.warn("onKeyVerificationRequest: Error processing outgoing requests", e);
1755
- });
1756
- })();
1757
- }
1758
-
1759
- /**
1760
- * Returns the cross-signing user identity of the current user.
1761
- *
1762
- * Not part of the public crypto-api interface.
1763
- * Used during migration from legacy js-crypto to update local trust if needed.
1764
- */
1765
- getOwnIdentity() {
1766
- var _this65 = this;
1767
- return _asyncToGenerator(function* () {
1768
- return yield _this65.olmMachine.getIdentity(new RustSdkCryptoJs.UserId(_this65.userId));
1769
- })();
1770
- }
1771
- }
1772
- class EventDecryptor {
1773
- constructor(logger, olmMachine, perSessionBackupDownloader) {
1774
- this.logger = logger;
1775
- this.olmMachine = olmMachine;
1776
- this.perSessionBackupDownloader = perSessionBackupDownloader;
1777
- /**
1778
- * Events which we couldn't decrypt due to unknown sessions / indexes.
1779
- *
1780
- * Map from roomId to sessionId to Set of MatrixEvents
1781
- */
1782
- _defineProperty(this, "eventsPendingKey", new MapWithDefault(() => new MapWithDefault(() => new Set())));
1783
- }
1784
- attemptEventDecryption(event, isolationMode) {
1785
- var _this66 = this;
1786
- return _asyncToGenerator(function* () {
1787
- // add the event to the pending list *before* attempting to decrypt.
1788
- // then, if the key turns up while decryption is in progress (and
1789
- // decryption fails), we will schedule a retry.
1790
- // (fixes https://github.com/vector-im/element-web/issues/5001)
1791
- _this66.addEventToPendingList(event);
1792
- var trustRequirement;
1793
- switch (isolationMode.kind) {
1794
- case DeviceIsolationModeKind.AllDevicesIsolationMode:
1795
- trustRequirement = RustSdkCryptoJs.TrustRequirement.Untrusted;
1796
- break;
1797
- case DeviceIsolationModeKind.OnlySignedDevicesIsolationMode:
1798
- trustRequirement = RustSdkCryptoJs.TrustRequirement.CrossSignedOrLegacy;
1799
- break;
1800
- }
1801
- try {
1802
- var res = yield _this66.olmMachine.decryptRoomEvent(stringifyEvent(event), new RustSdkCryptoJs.RoomId(event.getRoomId()), new RustSdkCryptoJs.DecryptionSettings(trustRequirement));
1803
-
1804
- // Success. We can remove the event from the pending list, if
1805
- // that hasn't already happened.
1806
- _this66.removeEventFromPendingList(event);
1807
- return {
1808
- clearEvent: JSON.parse(res.event),
1809
- claimedEd25519Key: res.senderClaimedEd25519Key,
1810
- senderCurve25519Key: res.senderCurve25519Key,
1811
- forwardingCurve25519KeyChain: res.forwardingCurve25519KeyChain
1812
- };
1813
- } catch (err) {
1814
- if (err instanceof RustSdkCryptoJs.MegolmDecryptionError) {
1815
- _this66.onMegolmDecryptionError(event, err, yield _this66.perSessionBackupDownloader.getServerBackupInfo());
1816
- } else {
1817
- throw new DecryptionError(DecryptionFailureCode.UNKNOWN_ERROR, "Unknown error");
1818
- }
1819
- }
1820
- })();
1821
- }
1822
-
1823
- /**
1824
- * Handle a `MegolmDecryptionError` returned by the rust SDK.
1825
- *
1826
- * Fires off a request to the `perSessionBackupDownloader`, if appropriate, and then throws a `DecryptionError`.
1827
- *
1828
- * @param event - The event which could not be decrypted.
1829
- * @param err - The error from the Rust SDK.
1830
- * @param serverBackupInfo - Details about the current backup from the server. `null` if there is no backup.
1831
- * `undefined` if our attempt to check failed.
1832
- */
1833
- onMegolmDecryptionError(event, err, serverBackupInfo) {
1834
- var content = event.getWireContent();
1835
- var errorDetails = {
1836
- sender_key: content.sender_key,
1837
- session_id: content.session_id
1838
- };
1839
-
1840
- // If the error looks like it might be recoverable from backup, queue up a request to try that.
1841
- if (err.code === RustSdkCryptoJs.DecryptionErrorCode.MissingRoomKey || err.code === RustSdkCryptoJs.DecryptionErrorCode.UnknownMessageIndex) {
1842
- this.perSessionBackupDownloader.onDecryptionKeyMissingError(event.getRoomId(), content.session_id);
1843
-
1844
- // If the server is telling us our membership at the time the event
1845
- // was sent, and it isn't "join", we use a different error code.
1846
- var membership = event.getMembershipAtEvent();
1847
- if (membership && membership !== KnownMembership.Join && membership !== KnownMembership.Invite) {
1848
- throw new DecryptionError(DecryptionFailureCode.HISTORICAL_MESSAGE_USER_NOT_JOINED, "This message was sent when we were not a member of the room.", errorDetails);
1849
- }
1850
-
1851
- // If the event was sent before this device was created, we use some different error codes.
1852
- if (event.getTs() <= this.olmMachine.deviceCreationTimeMs) {
1853
- if (serverBackupInfo === null) {
1854
- throw new DecryptionError(DecryptionFailureCode.HISTORICAL_MESSAGE_NO_KEY_BACKUP, "This message was sent before this device logged in, and there is no key backup on the server.", errorDetails);
1855
- } else if (!this.perSessionBackupDownloader.isKeyBackupDownloadConfigured()) {
1856
- throw new DecryptionError(DecryptionFailureCode.HISTORICAL_MESSAGE_BACKUP_UNCONFIGURED, "This message was sent before this device logged in, and key backup is not working.", errorDetails);
1857
- } else {
1858
- throw new DecryptionError(DecryptionFailureCode.HISTORICAL_MESSAGE_WORKING_BACKUP, "This message was sent before this device logged in. Key backup is working, but we still do not (yet) have the key.", errorDetails);
1859
- }
1860
- }
1861
- }
1862
-
1863
- // If we got a withheld code, expose that.
1864
- if (err.maybe_withheld) {
1865
- // Unfortunately the Rust SDK API doesn't let us distinguish between different withheld cases, other than
1866
- // by string-matching.
1867
- var failureCode = err.maybe_withheld === "The sender has disabled encrypting to unverified devices." ? DecryptionFailureCode.MEGOLM_KEY_WITHHELD_FOR_UNVERIFIED_DEVICE : DecryptionFailureCode.MEGOLM_KEY_WITHHELD;
1868
- throw new DecryptionError(failureCode, err.maybe_withheld, errorDetails);
1869
- }
1870
- switch (err.code) {
1871
- case RustSdkCryptoJs.DecryptionErrorCode.MissingRoomKey:
1872
- throw new DecryptionError(DecryptionFailureCode.MEGOLM_UNKNOWN_INBOUND_SESSION_ID, "The sender's device has not sent us the keys for this message.", errorDetails);
1873
- case RustSdkCryptoJs.DecryptionErrorCode.UnknownMessageIndex:
1874
- throw new DecryptionError(DecryptionFailureCode.OLM_UNKNOWN_MESSAGE_INDEX, "The sender's device has not sent us the keys for this message at this index.", errorDetails);
1875
- case RustSdkCryptoJs.DecryptionErrorCode.SenderIdentityPreviouslyVerified:
1876
- // We're refusing to decrypt due to not trusting the sender,
1877
- // rather than failing to decrypt due to lack of keys, so we
1878
- // don't need to keep it on the pending list.
1879
- this.removeEventFromPendingList(event);
1880
- throw new DecryptionError(DecryptionFailureCode.SENDER_IDENTITY_PREVIOUSLY_VERIFIED, "The sender identity is unverified, but was previously verified.");
1881
- case RustSdkCryptoJs.DecryptionErrorCode.UnknownSenderDevice:
1882
- // We're refusing to decrypt due to not trusting the sender,
1883
- // rather than failing to decrypt due to lack of keys, so we
1884
- // don't need to keep it on the pending list.
1885
- this.removeEventFromPendingList(event);
1886
- throw new DecryptionError(DecryptionFailureCode.UNKNOWN_SENDER_DEVICE, "The sender device is not known.");
1887
- case RustSdkCryptoJs.DecryptionErrorCode.UnsignedSenderDevice:
1888
- // We're refusing to decrypt due to not trusting the sender,
1889
- // rather than failing to decrypt due to lack of keys, so we
1890
- // don't need to keep it on the pending list.
1891
- this.removeEventFromPendingList(event);
1892
- throw new DecryptionError(DecryptionFailureCode.UNSIGNED_SENDER_DEVICE, "The sender identity is not cross-signed.");
1893
-
1894
- // We don't map MismatchedIdentityKeys for now, as there is no equivalent in legacy.
1895
- // Just put it on the `UNKNOWN_ERROR` bucket.
1896
- default:
1897
- throw new DecryptionError(DecryptionFailureCode.UNKNOWN_ERROR, err.description, errorDetails);
1898
- }
1899
- }
1900
- getEncryptionInfoForEvent(event) {
1901
- var _this67 = this;
1902
- return _asyncToGenerator(function* () {
1903
- if (!event.getClearContent() || event.isDecryptionFailure()) {
1904
- // not successfully decrypted
1905
- return null;
1906
- }
1907
-
1908
- // special-case outgoing events, which the rust crypto-sdk will barf on
1909
- if (event.status !== null) {
1910
- return {
1911
- shieldColour: EventShieldColour.NONE,
1912
- shieldReason: null
1913
- };
1914
- }
1915
- var encryptionInfo = yield _this67.olmMachine.getRoomEventEncryptionInfo(stringifyEvent(event), new RustSdkCryptoJs.RoomId(event.getRoomId()));
1916
- return rustEncryptionInfoToJsEncryptionInfo(_this67.logger, encryptionInfo);
1917
- })();
1918
- }
1919
-
1920
- /**
1921
- * Look for events which are waiting for a given megolm session
1922
- *
1923
- * Returns a list of events which were encrypted by `session` and could not be decrypted
1924
- */
1925
- getEventsPendingRoomKey(roomId, sessionId) {
1926
- var roomPendingEvents = this.eventsPendingKey.get(roomId);
1927
- if (!roomPendingEvents) return [];
1928
- var sessionPendingEvents = roomPendingEvents.get(sessionId);
1929
- if (!sessionPendingEvents) return [];
1930
- return [...sessionPendingEvents];
1931
- }
1932
-
1933
- /**
1934
- * Add an event to the list of those awaiting their session keys.
1935
- */
1936
- addEventToPendingList(event) {
1937
- var roomId = event.getRoomId();
1938
- // We shouldn't have events without a room id here.
1939
- if (!roomId) return;
1940
- var roomPendingEvents = this.eventsPendingKey.getOrCreate(roomId);
1941
- var sessionPendingEvents = roomPendingEvents.getOrCreate(event.getWireContent().session_id);
1942
- sessionPendingEvents.add(event);
1943
- }
1944
-
1945
- /**
1946
- * Remove an event from the list of those awaiting their session keys.
1947
- */
1948
- removeEventFromPendingList(event) {
1949
- var roomId = event.getRoomId();
1950
- if (!roomId) return;
1951
- var roomPendingEvents = this.eventsPendingKey.getOrCreate(roomId);
1952
- if (!roomPendingEvents) return;
1953
- var sessionPendingEvents = roomPendingEvents.get(event.getWireContent().session_id);
1954
- if (!sessionPendingEvents) return;
1955
- sessionPendingEvents.delete(event);
1956
-
1957
- // also clean up the higher-level maps if they are now empty
1958
- if (sessionPendingEvents.size === 0) {
1959
- roomPendingEvents.delete(event.getWireContent().session_id);
1960
- if (roomPendingEvents.size === 0) {
1961
- this.eventsPendingKey.delete(roomId);
1962
- }
1963
- }
1964
- }
1965
- }
1966
- function stringifyEvent(event) {
1967
- return JSON.stringify({
1968
- event_id: event.getId(),
1969
- type: event.getWireType(),
1970
- sender: event.getSender(),
1971
- state_key: event.getStateKey(),
1972
- content: event.getWireContent(),
1973
- origin_server_ts: event.getTs()
1974
- });
1975
- }
1976
- function rustEncryptionInfoToJsEncryptionInfo(logger, encryptionInfo) {
1977
- if (encryptionInfo === undefined) {
1978
- // not decrypted here
1979
- return null;
1980
- }
1981
-
1982
- // TODO: use strict shield semantics.
1983
- var shieldState = encryptionInfo.shieldState(false);
1984
- var shieldColour;
1985
- switch (shieldState.color) {
1986
- case RustSdkCryptoJs.ShieldColor.Grey:
1987
- shieldColour = EventShieldColour.GREY;
1988
- break;
1989
- case RustSdkCryptoJs.ShieldColor.None:
1990
- shieldColour = EventShieldColour.NONE;
1991
- break;
1992
- default:
1993
- shieldColour = EventShieldColour.RED;
1994
- }
1995
- var shieldReason;
1996
- if (shieldState.message === undefined) {
1997
- shieldReason = null;
1998
- } else if (shieldState.message === "Encrypted by an unverified user.") {
1999
- // this case isn't actually used with lax shield semantics.
2000
- shieldReason = EventShieldReason.UNVERIFIED_IDENTITY;
2001
- } else if (shieldState.message === "Encrypted by a device not verified by its owner.") {
2002
- shieldReason = EventShieldReason.UNSIGNED_DEVICE;
2003
- } else if (shieldState.message === "The authenticity of this encrypted message can't be guaranteed on this device.") {
2004
- shieldReason = EventShieldReason.AUTHENTICITY_NOT_GUARANTEED;
2005
- } else if (shieldState.message === "Encrypted by an unknown or deleted device.") {
2006
- shieldReason = EventShieldReason.UNKNOWN_DEVICE;
2007
- } else {
2008
- logger.warn("Unknown shield state message '".concat(shieldState.message, "'"));
2009
- shieldReason = EventShieldReason.UNKNOWN;
2010
- }
2011
- return {
2012
- shieldColour,
2013
- shieldReason
2014
- };
2015
- }
2016
- //# sourceMappingURL=rust-crypto.js.map