@unwanted/matrix-sdk-mini 34.13.0 → 36.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (95) hide show
  1. package/lib/@types/event.d.ts +25 -0
  2. package/lib/@types/event.d.ts.map +1 -1
  3. package/lib/@types/event.js +5 -0
  4. package/lib/@types/event.js.map +1 -1
  5. package/lib/client.d.ts +43 -8
  6. package/lib/client.d.ts.map +1 -1
  7. package/lib/client.js +147 -85
  8. package/lib/client.js.map +1 -1
  9. package/lib/embedded.d.ts +2 -1
  10. package/lib/embedded.d.ts.map +1 -1
  11. package/lib/embedded.js +57 -74
  12. package/lib/embedded.js.map +1 -1
  13. package/lib/feature.d.ts.map +1 -1
  14. package/lib/feature.js +2 -1
  15. package/lib/feature.js.map +1 -1
  16. package/lib/http-api/errors.d.ts +3 -3
  17. package/lib/http-api/errors.js +3 -3
  18. package/lib/http-api/errors.js.map +1 -1
  19. package/lib/http-api/utils.js +2 -2
  20. package/lib/http-api/utils.js.map +1 -1
  21. package/lib/models/event-timeline.d.ts.map +1 -1
  22. package/lib/models/event-timeline.js +1 -21
  23. package/lib/models/event-timeline.js.map +1 -1
  24. package/lib/models/event.d.ts +11 -1
  25. package/lib/models/event.d.ts.map +1 -1
  26. package/lib/models/event.js +48 -5
  27. package/lib/models/event.js.map +1 -1
  28. package/lib/models/invites-ignorer-types.d.ts +27 -0
  29. package/lib/models/invites-ignorer-types.d.ts.map +1 -0
  30. package/lib/models/invites-ignorer-types.js +36 -0
  31. package/lib/models/invites-ignorer-types.js.map +1 -0
  32. package/lib/models/invites-ignorer.d.ts +2 -26
  33. package/lib/models/invites-ignorer.d.ts.map +1 -1
  34. package/lib/models/invites-ignorer.js +2 -27
  35. package/lib/models/invites-ignorer.js.map +1 -1
  36. package/lib/models/room-member.d.ts +6 -1
  37. package/lib/models/room-member.d.ts.map +1 -1
  38. package/lib/models/room-member.js +7 -1
  39. package/lib/models/room-member.js.map +1 -1
  40. package/lib/models/room.d.ts +6 -1
  41. package/lib/models/room.d.ts.map +1 -1
  42. package/lib/models/room.js +7 -1
  43. package/lib/models/room.js.map +1 -1
  44. package/lib/oidc/authorize.d.ts +2 -2
  45. package/lib/oidc/authorize.d.ts.map +1 -1
  46. package/lib/oidc/authorize.js +5 -5
  47. package/lib/oidc/authorize.js.map +1 -1
  48. package/lib/oidc/discovery.d.ts +8 -0
  49. package/lib/oidc/discovery.d.ts.map +1 -1
  50. package/lib/oidc/discovery.js +22 -11
  51. package/lib/oidc/discovery.js.map +1 -1
  52. package/lib/oidc/index.d.ts +3 -4
  53. package/lib/oidc/index.d.ts.map +1 -1
  54. package/lib/oidc/index.js.map +1 -1
  55. package/lib/oidc/register.js +3 -3
  56. package/lib/oidc/register.js.map +1 -1
  57. package/lib/oidc/tokenRefresher.d.ts.map +1 -1
  58. package/lib/oidc/tokenRefresher.js +6 -5
  59. package/lib/oidc/tokenRefresher.js.map +1 -1
  60. package/lib/oidc/validate.d.ts +9 -23
  61. package/lib/oidc/validate.d.ts.map +1 -1
  62. package/lib/oidc/validate.js +13 -28
  63. package/lib/oidc/validate.js.map +1 -1
  64. package/lib/randomstring.d.ts +30 -3
  65. package/lib/randomstring.d.ts.map +1 -1
  66. package/lib/randomstring.js +68 -16
  67. package/lib/randomstring.js.map +1 -1
  68. package/lib/store/indexeddb-local-backend.js +4 -2
  69. package/lib/store/indexeddb-local-backend.js.map +1 -1
  70. package/lib/testing.d.ts +17 -0
  71. package/lib/testing.d.ts.map +1 -1
  72. package/lib/testing.js +42 -0
  73. package/lib/testing.js.map +1 -1
  74. package/package.json +5 -5
  75. package/src/@types/event.ts +17 -0
  76. package/src/client.ts +86 -28
  77. package/src/embedded.ts +39 -49
  78. package/src/feature.ts +1 -0
  79. package/src/http-api/errors.ts +3 -3
  80. package/src/http-api/utils.ts +2 -2
  81. package/src/models/event-timeline.ts +1 -21
  82. package/src/models/event.ts +46 -0
  83. package/src/models/invites-ignorer-types.ts +48 -0
  84. package/src/models/invites-ignorer.ts +7 -42
  85. package/src/models/room-member.ts +16 -1
  86. package/src/models/room.ts +16 -1
  87. package/src/oidc/authorize.ts +7 -7
  88. package/src/oidc/discovery.ts +16 -10
  89. package/src/oidc/index.ts +3 -4
  90. package/src/oidc/register.ts +3 -3
  91. package/src/oidc/tokenRefresher.ts +3 -2
  92. package/src/oidc/validate.ts +40 -63
  93. package/src/randomstring.ts +65 -19
  94. package/src/store/indexeddb-local-backend.ts +2 -2
  95. package/src/testing.ts +41 -0
package/lib/client.js CHANGED
@@ -46,7 +46,7 @@ import { NotificationCountType } from "./models/room.js";
46
46
  import { EventType, LOCAL_NOTIFICATION_SETTINGS_PREFIX, MSC3912_RELATION_BASED_REDACTIONS_PROP, MsgType, PUSHER_ENABLED, RelationType, RoomCreateTypeField, RoomType, UNSTABLE_MSC3088_ENABLED, UNSTABLE_MSC3088_PURPOSE, UNSTABLE_MSC3089_TREE_SUBTYPE } from "./@types/event.js";
47
47
  import { GuestAccess, HistoryVisibility, Preset } from "./@types/partials.js";
48
48
  import { eventMapperFor } from "./event-mapper.js";
49
- import { randomString } from "./randomstring.js";
49
+ import { secureRandomString } from "./randomstring.js";
50
50
  import { DEFAULT_TREE_POWER_LEVELS_TEMPLATE, MSC3089TreeSpace } from "./models/MSC3089TreeSpace.js";
51
51
  import { SearchOrderBy } from "./@types/search.js";
52
52
  import { PushRuleActionName, PushRuleKind } from "./@types/PushRules.js";
@@ -63,6 +63,7 @@ import { getRelationsThreadFilter } from "./thread-utils.js";
63
63
  import { KnownMembership } from "./@types/membership.js";
64
64
  import { ServerCapabilities } from "./serverCapabilities.js";
65
65
  import { sha256 } from "./digest.js";
66
+ import { discoverAndValidateOIDCIssuerWellKnown, validateAuthMetadataAndKeys } from "./oidc/index.js";
66
67
  var SCROLLBACK_DELAY_MS = 3000;
67
68
  export var UNSTABLE_MSC3852_LAST_SEEN_UA = new UnstableValue("last_seen_user_agent", "org.matrix.msc3852.last_seen_user_agent");
68
69
  export var PendingEventOrdering = /*#__PURE__*/function (PendingEventOrdering) {
@@ -211,7 +212,7 @@ export class MatrixClient extends TypedEventEmitter {
211
212
  this.usingExternalCrypto = (_opts$usingExternalCr = opts.usingExternalCrypto) !== null && _opts$usingExternalCr !== void 0 ? _opts$usingExternalCr : false;
212
213
  this.store = opts.store || new StubStore();
213
214
  this.deviceId = opts.deviceId || null;
214
- this.sessionId = randomString(10);
215
+ this.sessionId = secureRandomString(10);
215
216
  var userId = opts.userId || null;
216
217
  this.credentials = {
217
218
  userId
@@ -775,7 +776,7 @@ export class MatrixClient extends TypedEventEmitter {
775
776
  * @returns The array of users that are ignored (empty if none)
776
777
  */
777
778
  getIgnoredUsers() {
778
- var event = this.getAccountData("m.ignored_user_list");
779
+ var event = this.getAccountData(EventType.IgnoredUserList);
779
780
  if (!(event !== null && event !== void 0 && event.getContent()["ignored_users"])) return [];
780
781
  return Object.keys(event.getContent()["ignored_users"]);
781
782
  }
@@ -793,7 +794,7 @@ export class MatrixClient extends TypedEventEmitter {
793
794
  userIds.forEach(u => {
794
795
  content.ignored_users[u] = {};
795
796
  });
796
- return this.setAccountData("m.ignored_user_list", content);
797
+ return this.setAccountData(EventType.IgnoredUserList, content);
797
798
  }
798
799
 
799
800
  /**
@@ -3338,8 +3339,7 @@ export class MatrixClient extends TypedEventEmitter {
3338
3339
  if (_room5) {
3339
3340
  // Copy over a known event sender if we can
3340
3341
  for (var ev of sr.context.getTimeline()) {
3341
- var sender = _room5.getMember(ev.getSender());
3342
- if (!ev.sender && sender) ev.sender = sender;
3342
+ ev.setMetadata(_room5.currentState, false);
3343
3343
  }
3344
3344
  }
3345
3345
  searchResults.results.push(sr);
@@ -3835,7 +3835,7 @@ export class MatrixClient extends TypedEventEmitter {
3835
3835
  * @returns A new client secret
3836
3836
  */
3837
3837
  generateClientSecret() {
3838
- return randomString(32);
3838
+ return secureRandomString(32);
3839
3839
  }
3840
3840
 
3841
3841
  /**
@@ -4063,9 +4063,13 @@ export class MatrixClient extends TypedEventEmitter {
4063
4063
  /**
4064
4064
  * @returns Promise which resolves to a LoginResponse object
4065
4065
  * @returns Rejects: with an error response.
4066
+ *
4067
+ * @deprecated This method has unintuitive behaviour: it updates the `MatrixClient` instance with *some* of the
4068
+ * returned credentials. Instead, call {@link loginRequest} and create a new `MatrixClient` instance using the
4069
+ * results. See https://github.com/matrix-org/matrix-js-sdk/issues/4502.
4066
4070
  */
4067
4071
  login(loginType, data) {
4068
- return this.http.authedRequest(Method.Post, "/login", undefined, _objectSpread(_objectSpread({}, data), {}, {
4072
+ return this.loginRequest(_objectSpread(_objectSpread({}, data), {}, {
4069
4073
  type: loginType
4070
4074
  })).then(response => {
4071
4075
  if (response.access_token && response.user_id) {
@@ -4081,6 +4085,10 @@ export class MatrixClient extends TypedEventEmitter {
4081
4085
  /**
4082
4086
  * @returns Promise which resolves to a LoginResponse object
4083
4087
  * @returns Rejects: with an error response.
4088
+ *
4089
+ * @deprecated This method has unintuitive behaviour: it updates the `MatrixClient` instance with *some* of the
4090
+ * returned credentials. Instead, call {@link loginRequest} with `data.type: "m.login.password"`, and create a new
4091
+ * `MatrixClient` instance using the results. See https://github.com/matrix-org/matrix-js-sdk/issues/4502.
4084
4092
  */
4085
4093
  loginWithPassword(user, password) {
4086
4094
  return this.login("m.login.password", {
@@ -4126,6 +4134,10 @@ export class MatrixClient extends TypedEventEmitter {
4126
4134
  * @param token - Login token previously received from homeserver
4127
4135
  * @returns Promise which resolves to a LoginResponse object
4128
4136
  * @returns Rejects: with an error response.
4137
+ *
4138
+ * @deprecated This method has unintuitive behaviour: it updates the `MatrixClient` instance with *some* of the
4139
+ * returned credentials. Instead, call {@link loginRequest} with `data.type: "m.login.token"`, and create a new
4140
+ * `MatrixClient` instance using the results. See https://github.com/matrix-org/matrix-js-sdk/issues/4502.
4129
4141
  */
4130
4142
  loginWithToken(token) {
4131
4143
  return this.login("m.login.token", {
@@ -4133,6 +4145,23 @@ export class MatrixClient extends TypedEventEmitter {
4133
4145
  });
4134
4146
  }
4135
4147
 
4148
+ /**
4149
+ * Sends a `POST /login` request to the server.
4150
+ *
4151
+ * If successful, this will create a new device and access token for the user.
4152
+ *
4153
+ * @see {@link MatrixClient.loginFlows} which makes a `GET /login` request.
4154
+ * @see https://spec.matrix.org/v1.13/client-server-api/#post_matrixclientv3login
4155
+ *
4156
+ * @param data - Credentials and other details for the login request.
4157
+ */
4158
+ loginRequest(data) {
4159
+ var _this39 = this;
4160
+ return _asyncToGenerator(function* () {
4161
+ return yield _this39.http.authedRequest(Method.Post, "/login", undefined, data);
4162
+ })();
4163
+ }
4164
+
4136
4165
  /**
4137
4166
  * Logs out the current session.
4138
4167
  * Obviously, further calls that require authorisation should fail after this
@@ -4144,14 +4173,14 @@ export class MatrixClient extends TypedEventEmitter {
4144
4173
  */
4145
4174
  logout() {
4146
4175
  var _arguments7 = arguments,
4147
- _this39 = this;
4176
+ _this40 = this;
4148
4177
  return _asyncToGenerator(function* () {
4149
4178
  var stopClient = _arguments7.length > 0 && _arguments7[0] !== undefined ? _arguments7[0] : false;
4150
4179
  if (stopClient) {
4151
- _this39.stopClient();
4152
- _this39.http.abort();
4180
+ _this40.stopClient();
4181
+ _this40.http.abort();
4153
4182
  }
4154
- return _this39.http.authedRequest(Method.Post, "/logout");
4183
+ return _this40.http.authedRequest(Method.Post, "/logout");
4155
4184
  })();
4156
4185
  }
4157
4186
 
@@ -4189,12 +4218,12 @@ export class MatrixClient extends TypedEventEmitter {
4189
4218
  * or UIA auth data.
4190
4219
  */
4191
4220
  requestLoginToken(auth) {
4192
- var _this40 = this;
4221
+ var _this41 = this;
4193
4222
  return _asyncToGenerator(function* () {
4194
4223
  var body = {
4195
4224
  auth
4196
4225
  };
4197
- return _this40.http.authedRequest(Method.Post, "/login/get_token", undefined,
4226
+ return _this41.http.authedRequest(Method.Post, "/login/get_token", undefined,
4198
4227
  // no query params
4199
4228
  body, {
4200
4229
  prefix: ClientPrefix.V1
@@ -4226,23 +4255,23 @@ export class MatrixClient extends TypedEventEmitter {
4226
4255
  * @returns Rejects: with an error response.
4227
4256
  */
4228
4257
  createRoom(options) {
4229
- var _this41 = this;
4258
+ var _this42 = this;
4230
4259
  return _asyncToGenerator(function* () {
4231
- var _this41$identityServe;
4260
+ var _this42$identityServe;
4232
4261
  // eslint-disable-line camelcase
4233
4262
  // some valid options include: room_alias_name, visibility, invite
4234
4263
 
4235
4264
  // inject the id_access_token if inviting 3rd party addresses
4236
4265
  var invitesNeedingToken = (options.invite_3pid || []).filter(i => !i.id_access_token);
4237
- if (invitesNeedingToken.length > 0 && (_this41$identityServe = _this41.identityServer) !== null && _this41$identityServe !== void 0 && _this41$identityServe.getAccessToken) {
4238
- var identityAccessToken = yield _this41.identityServer.getAccessToken();
4266
+ if (invitesNeedingToken.length > 0 && (_this42$identityServe = _this42.identityServer) !== null && _this42$identityServe !== void 0 && _this42$identityServe.getAccessToken) {
4267
+ var identityAccessToken = yield _this42.identityServer.getAccessToken();
4239
4268
  if (identityAccessToken) {
4240
4269
  for (var invite of invitesNeedingToken) {
4241
4270
  invite.id_access_token = identityAccessToken;
4242
4271
  }
4243
4272
  }
4244
4273
  }
4245
- return _this41.http.authedRequest(Method.Post, "/createRoom", undefined, options);
4274
+ return _this42.http.authedRequest(Method.Post, "/createRoom", undefined, options);
4246
4275
  })();
4247
4276
  }
4248
4277
 
@@ -4426,7 +4455,7 @@ export class MatrixClient extends TypedEventEmitter {
4426
4455
  * @returns Promise which resolves: the empty object, `{}`.
4427
4456
  */
4428
4457
  setRoomReadMarkersHttpRequest(roomId, rmEventId, rrEventId, rpEventId) {
4429
- var _this42 = this;
4458
+ var _this43 = this;
4430
4459
  return _asyncToGenerator(function* () {
4431
4460
  var path = utils.encodeUri("/rooms/$roomId/read_markers", {
4432
4461
  $roomId: roomId
@@ -4435,10 +4464,10 @@ export class MatrixClient extends TypedEventEmitter {
4435
4464
  [ReceiptType.FullyRead]: rmEventId,
4436
4465
  [ReceiptType.Read]: rrEventId
4437
4466
  };
4438
- if ((yield _this42.doesServerSupportUnstableFeature("org.matrix.msc2285.stable")) || (yield _this42.isVersionSupported("v1.4"))) {
4467
+ if ((yield _this43.doesServerSupportUnstableFeature("org.matrix.msc2285.stable")) || (yield _this43.isVersionSupported("v1.4"))) {
4439
4468
  content[ReceiptType.ReadPrivate] = rpEventId;
4440
4469
  }
4441
- return _this42.http.authedRequest(Method.Post, path, undefined, content);
4470
+ return _this43.http.authedRequest(Method.Post, path, undefined, content);
4442
4471
  })();
4443
4472
  }
4444
4473
 
@@ -4671,9 +4700,9 @@ export class MatrixClient extends TypedEventEmitter {
4671
4700
  * @returns `true` if supported, otherwise `false`
4672
4701
  */
4673
4702
  doesServerSupportExtendedProfiles() {
4674
- var _this43 = this;
4703
+ var _this44 = this;
4675
4704
  return _asyncToGenerator(function* () {
4676
- return _this43.doesServerSupportUnstableFeature(UNSTABLE_MSC4133_EXTENDED_PROFILES);
4705
+ return _this44.doesServerSupportUnstableFeature(UNSTABLE_MSC4133_EXTENDED_PROFILES);
4677
4706
  })();
4678
4707
  }
4679
4708
 
@@ -4683,9 +4712,9 @@ export class MatrixClient extends TypedEventEmitter {
4683
4712
  * @returns The prefix for use with `authedRequest`
4684
4713
  */
4685
4714
  getExtendedProfileRequestPrefix() {
4686
- var _this44 = this;
4715
+ var _this45 = this;
4687
4716
  return _asyncToGenerator(function* () {
4688
- if (yield _this44.doesServerSupportUnstableFeature("uk.tcpip.msc4133.stable")) {
4717
+ if (yield _this45.doesServerSupportUnstableFeature("uk.tcpip.msc4133.stable")) {
4689
4718
  return ClientPrefix.V3;
4690
4719
  }
4691
4720
  return "/_matrix/client/unstable/uk.tcpip.msc4133";
@@ -4703,15 +4732,15 @@ export class MatrixClient extends TypedEventEmitter {
4703
4732
  * @throws A M_NOT_FOUND error if the profile could not be found.
4704
4733
  */
4705
4734
  getExtendedProfile(userId) {
4706
- var _this45 = this;
4735
+ var _this46 = this;
4707
4736
  return _asyncToGenerator(function* () {
4708
- if (!(yield _this45.doesServerSupportExtendedProfiles())) {
4737
+ if (!(yield _this46.doesServerSupportExtendedProfiles())) {
4709
4738
  throw new Error("Server does not support extended profiles");
4710
4739
  }
4711
- return _this45.http.authedRequest(Method.Get, utils.encodeUri("/profile/$userId", {
4740
+ return _this46.http.authedRequest(Method.Get, utils.encodeUri("/profile/$userId", {
4712
4741
  $userId: userId
4713
4742
  }), undefined, undefined, {
4714
- prefix: yield _this45.getExtendedProfileRequestPrefix()
4743
+ prefix: yield _this46.getExtendedProfileRequestPrefix()
4715
4744
  });
4716
4745
  })();
4717
4746
  }
@@ -4728,16 +4757,16 @@ export class MatrixClient extends TypedEventEmitter {
4728
4757
  * @throws A M_NOT_FOUND error if the key was not set OR the profile could not be found.
4729
4758
  */
4730
4759
  getExtendedProfileProperty(userId, key) {
4731
- var _this46 = this;
4760
+ var _this47 = this;
4732
4761
  return _asyncToGenerator(function* () {
4733
- if (!(yield _this46.doesServerSupportExtendedProfiles())) {
4762
+ if (!(yield _this47.doesServerSupportExtendedProfiles())) {
4734
4763
  throw new Error("Server does not support extended profiles");
4735
4764
  }
4736
- var profile = yield _this46.http.authedRequest(Method.Get, utils.encodeUri("/profile/$userId/$key", {
4765
+ var profile = yield _this47.http.authedRequest(Method.Get, utils.encodeUri("/profile/$userId/$key", {
4737
4766
  $userId: userId,
4738
4767
  $key: key
4739
4768
  }), undefined, undefined, {
4740
- prefix: yield _this46.getExtendedProfileRequestPrefix()
4769
+ prefix: yield _this47.getExtendedProfileRequestPrefix()
4741
4770
  });
4742
4771
  return profile[key];
4743
4772
  })();
@@ -4753,19 +4782,19 @@ export class MatrixClient extends TypedEventEmitter {
4753
4782
  * @throws An error if the server does not support MSC4133 OR the server disallows editing the user profile.
4754
4783
  */
4755
4784
  setExtendedProfileProperty(key, value) {
4756
- var _this47 = this;
4785
+ var _this48 = this;
4757
4786
  return _asyncToGenerator(function* () {
4758
- if (!(yield _this47.doesServerSupportExtendedProfiles())) {
4787
+ if (!(yield _this48.doesServerSupportExtendedProfiles())) {
4759
4788
  throw new Error("Server does not support extended profiles");
4760
4789
  }
4761
- var userId = _this47.getUserId();
4762
- yield _this47.http.authedRequest(Method.Put, utils.encodeUri("/profile/$userId/$key", {
4790
+ var userId = _this48.getUserId();
4791
+ yield _this48.http.authedRequest(Method.Put, utils.encodeUri("/profile/$userId/$key", {
4763
4792
  $userId: userId,
4764
4793
  $key: key
4765
4794
  }), undefined, {
4766
4795
  [key]: value
4767
4796
  }, {
4768
- prefix: yield _this47.getExtendedProfileRequestPrefix()
4797
+ prefix: yield _this48.getExtendedProfileRequestPrefix()
4769
4798
  });
4770
4799
  })();
4771
4800
  }
@@ -4779,17 +4808,17 @@ export class MatrixClient extends TypedEventEmitter {
4779
4808
  * @throws An error if the server does not support MSC4133 OR the server disallows editing the user profile.
4780
4809
  */
4781
4810
  deleteExtendedProfileProperty(key) {
4782
- var _this48 = this;
4811
+ var _this49 = this;
4783
4812
  return _asyncToGenerator(function* () {
4784
- if (!(yield _this48.doesServerSupportExtendedProfiles())) {
4813
+ if (!(yield _this49.doesServerSupportExtendedProfiles())) {
4785
4814
  throw new Error("Server does not support extended profiles");
4786
4815
  }
4787
- var userId = _this48.getUserId();
4788
- yield _this48.http.authedRequest(Method.Delete, utils.encodeUri("/profile/$userId/$key", {
4816
+ var userId = _this49.getUserId();
4817
+ yield _this49.http.authedRequest(Method.Delete, utils.encodeUri("/profile/$userId/$key", {
4789
4818
  $userId: userId,
4790
4819
  $key: key
4791
4820
  }), undefined, undefined, {
4792
- prefix: yield _this48.getExtendedProfileRequestPrefix()
4821
+ prefix: yield _this49.getExtendedProfileRequestPrefix()
4793
4822
  });
4794
4823
  })();
4795
4824
  }
@@ -4805,16 +4834,16 @@ export class MatrixClient extends TypedEventEmitter {
4805
4834
  * @throws An error if the server does not support MSC4133 OR the server disallows editing the user profile.
4806
4835
  */
4807
4836
  patchExtendedProfile(profile) {
4808
- var _this49 = this;
4837
+ var _this50 = this;
4809
4838
  return _asyncToGenerator(function* () {
4810
- if (!(yield _this49.doesServerSupportExtendedProfiles())) {
4839
+ if (!(yield _this50.doesServerSupportExtendedProfiles())) {
4811
4840
  throw new Error("Server does not support extended profiles");
4812
4841
  }
4813
- var userId = _this49.getUserId();
4814
- return _this49.http.authedRequest(Method.Patch, utils.encodeUri("/profile/$userId", {
4842
+ var userId = _this50.getUserId();
4843
+ return _this50.http.authedRequest(Method.Patch, utils.encodeUri("/profile/$userId", {
4815
4844
  $userId: userId
4816
4845
  }), {}, profile, {
4817
- prefix: yield _this49.getExtendedProfileRequestPrefix()
4846
+ prefix: yield _this50.getExtendedProfileRequestPrefix()
4818
4847
  });
4819
4848
  })();
4820
4849
  }
@@ -4829,16 +4858,16 @@ export class MatrixClient extends TypedEventEmitter {
4829
4858
  * @throws An error if the server does not support MSC4133 OR the server disallows editing the user profile.
4830
4859
  */
4831
4860
  setExtendedProfile(profile) {
4832
- var _this50 = this;
4861
+ var _this51 = this;
4833
4862
  return _asyncToGenerator(function* () {
4834
- if (!(yield _this50.doesServerSupportExtendedProfiles())) {
4863
+ if (!(yield _this51.doesServerSupportExtendedProfiles())) {
4835
4864
  throw new Error("Server does not support extended profiles");
4836
4865
  }
4837
- var userId = _this50.getUserId();
4838
- yield _this50.http.authedRequest(Method.Put, utils.encodeUri("/profile/$userId", {
4866
+ var userId = _this51.getUserId();
4867
+ yield _this51.http.authedRequest(Method.Put, utils.encodeUri("/profile/$userId", {
4839
4868
  $userId: userId
4840
4869
  }), {}, profile, {
4841
- prefix: yield _this50.getExtendedProfileRequestPrefix()
4870
+ prefix: yield _this51.getExtendedProfileRequestPrefix()
4842
4871
  });
4843
4872
  })();
4844
4873
  }
@@ -4861,10 +4890,10 @@ export class MatrixClient extends TypedEventEmitter {
4861
4890
  * @returns Rejects: with an error response.
4862
4891
  */
4863
4892
  addThreePidOnly(data) {
4864
- var _this51 = this;
4893
+ var _this52 = this;
4865
4894
  return _asyncToGenerator(function* () {
4866
4895
  var path = "/account/3pid/add";
4867
- return _this51.http.authedRequest(Method.Post, path, undefined, data);
4896
+ return _this52.http.authedRequest(Method.Post, path, undefined, data);
4868
4897
  })();
4869
4898
  }
4870
4899
 
@@ -4880,10 +4909,10 @@ export class MatrixClient extends TypedEventEmitter {
4880
4909
  * @returns Rejects: with an error response.
4881
4910
  */
4882
4911
  bindThreePid(data) {
4883
- var _this52 = this;
4912
+ var _this53 = this;
4884
4913
  return _asyncToGenerator(function* () {
4885
4914
  var path = "/account/3pid/bind";
4886
- return _this52.http.authedRequest(Method.Post, path, undefined, data);
4915
+ return _this53.http.authedRequest(Method.Post, path, undefined, data);
4887
4916
  })();
4888
4917
  }
4889
4918
 
@@ -4901,15 +4930,15 @@ export class MatrixClient extends TypedEventEmitter {
4901
4930
  unbindThreePid(medium, address
4902
4931
  // eslint-disable-next-line camelcase
4903
4932
  ) {
4904
- var _this53 = this;
4933
+ var _this54 = this;
4905
4934
  return _asyncToGenerator(function* () {
4906
4935
  var path = "/account/3pid/unbind";
4907
4936
  var data = {
4908
4937
  medium,
4909
4938
  address,
4910
- id_server: _this53.getIdentityServerUrl(true)
4939
+ id_server: _this54.getIdentityServerUrl(true)
4911
4940
  };
4912
- return _this53.http.authedRequest(Method.Post, path, undefined, data);
4941
+ return _this54.http.authedRequest(Method.Post, path, undefined, data);
4913
4942
  })();
4914
4943
  }
4915
4944
 
@@ -5031,13 +5060,13 @@ export class MatrixClient extends TypedEventEmitter {
5031
5060
  * @returns Rejects: with an error response.
5032
5061
  */
5033
5062
  getPushers() {
5034
- var _this54 = this;
5063
+ var _this55 = this;
5035
5064
  return _asyncToGenerator(function* () {
5036
- var response = yield _this54.http.authedRequest(Method.Get, "/pushers");
5065
+ var response = yield _this55.http.authedRequest(Method.Get, "/pushers");
5037
5066
 
5038
5067
  // Migration path for clients that connect to a homeserver that does not support
5039
5068
  // MSC3881 yet, see https://github.com/matrix-org/matrix-spec-proposals/blob/kerry/remote-push-toggle/proposals/3881-remote-push-notification-toggling.md#migration
5040
- if (!(yield _this54.doesServerSupportUnstableFeature("org.matrix.msc3881"))) {
5069
+ if (!(yield _this55.doesServerSupportUnstableFeature("org.matrix.msc3881"))) {
5041
5070
  response.pushers = response.pushers.map(pusher => {
5042
5071
  if (!pusher.hasOwnProperty(PUSHER_ENABLED.name)) {
5043
5072
  pusher[PUSHER_ENABLED.name] = true;
@@ -5377,7 +5406,7 @@ export class MatrixClient extends TypedEventEmitter {
5377
5406
  * found MXIDs. Results where no user could be found will not be listed.
5378
5407
  */
5379
5408
  identityHashedLookup(addressPairs, identityAccessToken) {
5380
- var _this55 = this;
5409
+ var _this56 = this;
5381
5410
  return _asyncToGenerator(function* () {
5382
5411
  var params = {
5383
5412
  // addresses: ["email@example.org", "10005550000"],
@@ -5386,7 +5415,7 @@ export class MatrixClient extends TypedEventEmitter {
5386
5415
  };
5387
5416
 
5388
5417
  // Get hash information first before trying to do a lookup
5389
- var hashes = yield _this55.getIdentityHashDetails(identityAccessToken);
5418
+ var hashes = yield _this56.getIdentityHashDetails(identityAccessToken);
5390
5419
  if (!hashes || !hashes["lookup_pepper"] || !hashes["algorithms"]) {
5391
5420
  throw new Error("Unsupported identity server: bad response");
5392
5421
  }
@@ -5429,7 +5458,7 @@ export class MatrixClient extends TypedEventEmitter {
5429
5458
  } else {
5430
5459
  throw new Error("Unsupported identity server: unknown hash algorithm");
5431
5460
  }
5432
- var response = yield _this55.http.idServerRequest(Method.Post, "/lookup", params, IdentityPrefix.V2, identityAccessToken);
5461
+ var response = yield _this56.http.idServerRequest(Method.Post, "/lookup", params, IdentityPrefix.V2, identityAccessToken);
5433
5462
  if (!(response !== null && response !== void 0 && response["mappings"])) return []; // no results
5434
5463
 
5435
5464
  var foundAddresses = [];
@@ -5463,12 +5492,12 @@ export class MatrixClient extends TypedEventEmitter {
5463
5492
  * @returns Rejects: with an error response.
5464
5493
  */
5465
5494
  lookupThreePid(medium, address, identityAccessToken) {
5466
- var _this56 = this;
5495
+ var _this57 = this;
5467
5496
  return _asyncToGenerator(function* () {
5468
5497
  // Note: we're using the V2 API by calling this function, but our
5469
5498
  // function contract requires a V1 response. We therefore have to
5470
5499
  // convert it manually.
5471
- var response = yield _this56.identityHashedLookup([[address, medium]], identityAccessToken);
5500
+ var response = yield _this57.identityHashedLookup([[address, medium]], identityAccessToken);
5472
5501
  var result = response.find(p => p.address === address);
5473
5502
  if (!result) {
5474
5503
  return {};
@@ -5500,12 +5529,12 @@ export class MatrixClient extends TypedEventEmitter {
5500
5529
  * @returns Rejects: with an error response.
5501
5530
  */
5502
5531
  bulkLookupThreePids(query, identityAccessToken) {
5503
- var _this57 = this;
5532
+ var _this58 = this;
5504
5533
  return _asyncToGenerator(function* () {
5505
5534
  // Note: we're using the V2 API by calling this function, but our
5506
5535
  // function contract requires a V1 response. We therefore have to
5507
5536
  // convert it manually.
5508
- var response = yield _this57.identityHashedLookup(
5537
+ var response = yield _this58.identityHashedLookup(
5509
5538
  // We have to reverse the query order to get [address, medium] pairs
5510
5539
  query.map(p => [p[1], p[0]]), identityAccessToken);
5511
5540
  var v1results = [];
@@ -5706,16 +5735,16 @@ export class MatrixClient extends TypedEventEmitter {
5706
5735
  * @returns Promise which resolves to the created space.
5707
5736
  */
5708
5737
  unstableCreateFileTree(name) {
5709
- var _this58 = this;
5738
+ var _this59 = this;
5710
5739
  return _asyncToGenerator(function* () {
5711
5740
  var {
5712
5741
  room_id: roomId
5713
- } = yield _this58.createRoom({
5742
+ } = yield _this59.createRoom({
5714
5743
  name: name,
5715
5744
  preset: Preset.PrivateChat,
5716
5745
  power_level_content_override: _objectSpread(_objectSpread({}, DEFAULT_TREE_POWER_LEVELS_TEMPLATE), {}, {
5717
5746
  users: {
5718
- [_this58.getUserId()]: 100
5747
+ [_this59.getUserId()]: 100
5719
5748
  }
5720
5749
  }),
5721
5750
  creation_content: {
@@ -5729,7 +5758,7 @@ export class MatrixClient extends TypedEventEmitter {
5729
5758
  }
5730
5759
  }]
5731
5760
  });
5732
- return new MSC3089TreeSpace(_this58, roomId);
5761
+ return new MSC3089TreeSpace(_this59, roomId);
5733
5762
  })();
5734
5763
  }
5735
5764
 
@@ -5806,7 +5835,7 @@ export class MatrixClient extends TypedEventEmitter {
5806
5835
  * @param via - The list of servers which know about the room if only an ID was provided.
5807
5836
  */
5808
5837
  getRoomSummary(roomIdOrAlias, via) {
5809
- var _this59 = this;
5838
+ var _this60 = this;
5810
5839
  return _asyncToGenerator(function* () {
5811
5840
  var paramOpts = {
5812
5841
  prefix: "/_matrix/client/unstable/im.nheko.summary"
@@ -5815,7 +5844,7 @@ export class MatrixClient extends TypedEventEmitter {
5815
5844
  var path = utils.encodeUri("/summary/$roomid", {
5816
5845
  $roomid: roomIdOrAlias
5817
5846
  });
5818
- return yield _this59.http.authedRequest(Method.Get, path, {
5847
+ return yield _this60.http.authedRequest(Method.Get, path, {
5819
5848
  via
5820
5849
  }, undefined, paramOpts);
5821
5850
  } catch (e) {
@@ -5823,7 +5852,7 @@ export class MatrixClient extends TypedEventEmitter {
5823
5852
  var _path = utils.encodeUri("/rooms/$roomid/summary", {
5824
5853
  $roomid: roomIdOrAlias
5825
5854
  });
5826
- return yield _this59.http.authedRequest(Method.Get, _path, {
5855
+ return yield _this60.http.authedRequest(Method.Get, _path, {
5827
5856
  via
5828
5857
  }, undefined, paramOpts);
5829
5858
  } else {
@@ -5875,9 +5904,9 @@ export class MatrixClient extends TypedEventEmitter {
5875
5904
  * Fetches information about the user for the configured access token.
5876
5905
  */
5877
5906
  whoami() {
5878
- var _this60 = this;
5907
+ var _this61 = this;
5879
5908
  return _asyncToGenerator(function* () {
5880
- return _this60.http.authedRequest(Method.Get, "/account/whoami");
5909
+ return _this61.http.authedRequest(Method.Get, "/account/whoami");
5881
5910
  })();
5882
5911
  }
5883
5912
 
@@ -5888,7 +5917,7 @@ export class MatrixClient extends TypedEventEmitter {
5888
5917
  * @returns Rejects: when the request fails (module:http-api.MatrixError)
5889
5918
  */
5890
5919
  timestampToEvent(roomId, timestamp, dir) {
5891
- var _this61 = this;
5920
+ var _this62 = this;
5892
5921
  return _asyncToGenerator(function* () {
5893
5922
  var path = utils.encodeUri("/rooms/$roomId/timestamp_to_event", {
5894
5923
  $roomId: roomId
@@ -5898,7 +5927,7 @@ export class MatrixClient extends TypedEventEmitter {
5898
5927
  dir: dir
5899
5928
  };
5900
5929
  try {
5901
- return yield _this61.http.authedRequest(Method.Get, path, queryParams, undefined, {
5930
+ return yield _this62.http.authedRequest(Method.Get, path, queryParams, undefined, {
5902
5931
  prefix: ClientPrefix.V1
5903
5932
  });
5904
5933
  } catch (err) {
@@ -5914,7 +5943,7 @@ export class MatrixClient extends TypedEventEmitter {
5914
5943
  // both indicate that this endpoint+verb combination is
5915
5944
  // not supported.
5916
5945
  err.httpStatus === 404 || err.httpStatus === 405)) {
5917
- return yield _this61.http.authedRequest(Method.Get, path, queryParams, undefined, {
5946
+ return yield _this62.http.authedRequest(Method.Get, path, queryParams, undefined, {
5918
5947
  prefix: "/_matrix/client/unstable/org.matrix.msc3030"
5919
5948
  });
5920
5949
  }
@@ -5928,15 +5957,48 @@ export class MatrixClient extends TypedEventEmitter {
5928
5957
  * @returns Resolves: A promise of an object containing the OIDC issuer if configured
5929
5958
  * @returns Rejects: when the request fails (module:http-api.MatrixError)
5930
5959
  * @experimental - part of MSC2965
5960
+ * @deprecated in favour of getAuthMetadata
5931
5961
  */
5932
5962
  getAuthIssuer() {
5933
- var _this62 = this;
5963
+ var _this63 = this;
5934
5964
  return _asyncToGenerator(function* () {
5935
- return _this62.http.request(Method.Get, "/auth_issuer", undefined, undefined, {
5965
+ return _this63.http.request(Method.Get, "/auth_issuer", undefined, undefined, {
5936
5966
  prefix: ClientPrefix.Unstable + "/org.matrix.msc2965"
5937
5967
  });
5938
5968
  })();
5939
5969
  }
5970
+
5971
+ /**
5972
+ * Discover and validate delegated auth configuration
5973
+ * - delegated auth issuer openid-configuration is reachable
5974
+ * - delegated auth issuer openid-configuration is configured correctly for us
5975
+ * Fetches /auth_metadata falling back to legacy implementation using /auth_issuer followed by
5976
+ * https://oidc-issuer.example.com/.well-known/openid-configuration and other files linked therein.
5977
+ * When successful, validated metadata is returned
5978
+ * @returns validated authentication metadata and optionally signing keys
5979
+ * @throws when delegated auth config is invalid or unreachable
5980
+ * @experimental - part of MSC2965
5981
+ */
5982
+ getAuthMetadata() {
5983
+ var _this64 = this;
5984
+ return _asyncToGenerator(function* () {
5985
+ var authMetadata;
5986
+ try {
5987
+ authMetadata = yield _this64.http.request(Method.Get, "/auth_metadata", undefined, undefined, {
5988
+ prefix: ClientPrefix.Unstable + "/org.matrix.msc2965"
5989
+ });
5990
+ } catch (e) {
5991
+ if (e instanceof MatrixError && e.errcode === "M_UNRECOGNIZED") {
5992
+ var {
5993
+ issuer
5994
+ } = yield _this64.getAuthIssuer();
5995
+ return discoverAndValidateOIDCIssuerWellKnown(issuer);
5996
+ }
5997
+ throw e;
5998
+ }
5999
+ return validateAuthMetadataAndKeys(authMetadata);
6000
+ })();
6001
+ }
5940
6002
  }
5941
6003
  _defineProperty(MatrixClient, "RESTORE_BACKUP_ERROR_BAD_KEY", "RESTORE_BACKUP_ERROR_BAD_KEY");
5942
6004
  function getUnstableDelayQueryOpts(delayOpts) {