UNPKG

matrix-js-sdk

Version:
1,461 lines (1,284 loc) 346 kB
/* Copyright 2015-2021 The Matrix.org Foundation C.I.C. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ /** * This is an internal module. See {@link MatrixClient} for the public class. * @module client */ import { EventEmitter } from "events"; import { ISyncStateData, SyncApi } from "./sync"; import { EventStatus, IContent, IDecryptOptions, IEvent, MatrixEvent } from "./models/event"; import { StubStore } from "./store/stub"; import { createNewMatrixCall, MatrixCall } from "./webrtc/call"; import { Filter, IFilterDefinition } from "./filter"; import { CallEventHandler } from './webrtc/callEventHandler'; import * as utils from './utils'; import { sleep } from './utils'; import { Group } from "./models/group"; import { Direction, EventTimeline } from "./models/event-timeline"; import { IActionsObject, PushProcessor } from "./pushprocessor"; import { AutoDiscovery, AutoDiscoveryAction } from "./autodiscovery"; import * as olmlib from "./crypto/olmlib"; import { decodeBase64, encodeBase64 } from "./crypto/olmlib"; import { IExportedDevice as IOlmDevice } from "./crypto/OlmDevice"; import { ReEmitter } from './ReEmitter'; import { IRoomEncryption, RoomList } from './crypto/RoomList'; import { logger } from './logger'; import { SERVICE_TYPES } from './service-types'; import { MatrixError, MatrixHttpApi, PREFIX_IDENTITY_V2, PREFIX_MEDIA_R0, PREFIX_R0, PREFIX_UNSTABLE, retryNetworkOperation, } from "./http-api"; import { Crypto, fixBackupKey, IBootstrapCrossSigningOpts, ICheckOwnCrossSigningTrustOpts, IMegolmSessionData, isCryptoAvailable, VerificationMethod, } from './crypto'; import { DeviceInfo, IDevice } from "./crypto/deviceinfo"; import { decodeRecoveryKey } from './crypto/recoverykey'; import { keyFromAuthData } from './crypto/key_passphrase'; import { User } from "./models/user"; import { getHttpUriForMxc } from "./content-repo"; import { SearchResult } from "./models/search-result"; import { DEHYDRATION_ALGORITHM, IDehydratedDevice, IDehydratedDeviceKeyInfo, IDeviceKeys, IOneTimeKey, } from "./crypto/dehydration"; import { IKeyBackupInfo, IKeyBackupPrepareOpts, IKeyBackupRestoreOpts, IKeyBackupRestoreResult, } from "./crypto/keybackup"; import { IIdentityServerProvider } from "./@types/IIdentityServerProvider"; import type Request from "request"; import { MatrixScheduler } from "./scheduler"; import { ICryptoCallbacks, IMinimalEvent, IRoomEvent, IStateEvent, NotificationCountType } from "./matrix"; import { CrossSigningKey, IAddSecretStorageKeyOpts, ICreateSecretStorageOpts, IEncryptedEventInfo, IImportRoomKeysOpts, IRecoveryKey, ISecretStorageKeyInfo, } from "./crypto/api"; import { SyncState } from "./sync.api"; import { EventTimelineSet } from "./models/event-timeline-set"; import { VerificationRequest } from "./crypto/verification/request/VerificationRequest"; import { VerificationBase as Verification } from "./crypto/verification/Base"; import * as ContentHelpers from "./content-helpers"; import { CrossSigningInfo, DeviceTrustLevel, ICacheCallbacks, UserTrustLevel } from "./crypto/CrossSigning"; import { Room } from "./models/room"; import { IAddThreePidOnlyBody, IBindThreePidBody, ICreateRoomOpts, IEventSearchOpts, IGuestAccessOpts, IJoinRoomOpts, IPaginateOpts, IPresenceOpts, IRedactOpts, IRoomDirectoryOptions, ISearchOpts, ISendEventResponse, IUploadOpts, } from "./@types/requests"; import { EventType, MsgType, RelationType, RoomCreateTypeField, RoomType, UNSTABLE_MSC3088_ENABLED, UNSTABLE_MSC3088_PURPOSE, UNSTABLE_MSC3089_TREE_SUBTYPE, } from "./@types/event"; import { IAbortablePromise, IdServerUnbindResult, IImageInfo, Preset, Visibility } from "./@types/partials"; import { EventMapper, eventMapperFor, MapperOpts } from "./event-mapper"; import { randomString } from "./randomstring"; import { ReadStream } from "fs"; import { WebStorageSessionStore } from "./store/session/webstorage"; import { BackupManager, IKeyBackup, IKeyBackupCheck, IPreparedKeyBackupVersion, TrustInfo } from "./crypto/backup"; import { DEFAULT_TREE_POWER_LEVELS_TEMPLATE, MSC3089TreeSpace } from "./models/MSC3089TreeSpace"; import { ISignatures } from "./@types/signed"; import { IStore } from "./store"; import { ISecretRequest } from "./crypto/SecretStorage"; import { IEventWithRoomId, ISearchRequestBody, ISearchResponse, ISearchResults, IStateEventWithRoomId, SearchOrderBy, } from "./@types/search"; import { ISynapseAdminDeactivateResponse, ISynapseAdminWhoisResponse } from "./@types/synapse"; import { IHierarchyRoom, ISpaceSummaryEvent, ISpaceSummaryRoom } from "./@types/spaces"; import { IPusher, IPusherRequest, IPushRules, PushRuleAction, PushRuleKind, RuleId } from "./@types/PushRules"; import { IThreepid } from "./@types/threepids"; import { CryptoStore } from "./crypto/store/base"; import { MediaHandler } from "./webrtc/mediaHandler"; export type Store = IStore; export type SessionStore = WebStorageSessionStore; export type Callback = (err: Error | any | null, data?: any) => void; export type ResetTimelineCallback = (roomId: string) => boolean; const SCROLLBACK_DELAY_MS = 3000; export const CRYPTO_ENABLED: boolean = isCryptoAvailable(); const CAPABILITIES_CACHE_MS = 21600000; // 6 hours - an arbitrary value const TURN_CHECK_INTERVAL = 10 * 60 * 1000; // poll for turn credentials every 10 minutes interface IExportedDevice { olmDevice: IOlmDevice; userId: string; deviceId: string; } export interface IKeysUploadResponse { one_time_key_counts: { // eslint-disable-line camelcase [algorithm: string]: number; }; } export interface ICreateClientOpts { baseUrl: string; idBaseUrl?: string; /** * The data store used for sync data from the homeserver. If not specified, * this client will not store any HTTP responses. The `createClient` helper * will create a default store if needed. */ store?: Store; /** * A store to be used for end-to-end crypto session data. If not specified, * end-to-end crypto will be disabled. The `createClient` helper will create * a default store if needed. */ cryptoStore?: CryptoStore; /** * The scheduler to use. If not * specified, this client will not retry requests on failure. This client * will supply its own processing function to * {@link module:scheduler~MatrixScheduler#setProcessFunction}. */ scheduler?: MatrixScheduler; /** * The function to invoke for HTTP * requests. The value of this property is typically <code>require("request") * </code> as it returns a function which meets the required interface. See * {@link requestFunction} for more information. */ request?: Request; userId?: string; /** * A unique identifier for this device; used for tracking things like crypto * keys and access tokens. If not specified, end-to-end encryption will be * disabled. */ deviceId?: string; accessToken?: string; /** * Identity server provider to retrieve the user's access token when accessing * the identity server. See also https://github.com/vector-im/element-web/issues/10615 * which seeks to replace the previous approach of manual access tokens params * with this callback throughout the SDK. */ identityServer?: IIdentityServerProvider; /** * The default maximum amount of * time to wait before timing out HTTP requests. If not specified, there is no timeout. */ localTimeoutMs?: number; /** * Set to true to use * Authorization header instead of query param to send the access token to the server. * * Default false. */ useAuthorizationHeader?: boolean; /** * Set to true to enable * improved timeline support ({@link module:client~MatrixClient#getEventTimeline getEventTimeline}). It is * disabled by default for compatibility with older clients - in particular to * maintain support for back-paginating the live timeline after a '/sync' * result with a gap. */ timelineSupport?: boolean; /** * Extra query parameters to append * to all requests with this client. Useful for application services which require * <code>?user_id=</code>. */ queryParams?: Record<string, unknown>; /** * Device data exported with * "exportDevice" method that must be imported to recreate this device. * Should only be useful for devices with end-to-end crypto enabled. * If provided, deviceId and userId should **NOT** be provided at the top * level (they are present in the exported data). */ deviceToImport?: IExportedDevice; /** * Key used to pickle olm objects or other sensitive data. */ pickleKey?: string; /** * A store to be used for end-to-end crypto session data. Most data has been * migrated out of here to `cryptoStore` instead. If not specified, * end-to-end crypto will be disabled. The `createClient` helper * _will not_ create this store at the moment. */ sessionStore?: SessionStore; /** * Set to true to enable client-side aggregation of event relations * via `EventTimelineSet#getRelationsForEvent`. * This feature is currently unstable and the API may change without notice. */ unstableClientRelationAggregation?: boolean; verificationMethods?: Array<VerificationMethod>; /** * Whether relaying calls through a TURN server should be forced. Default false. */ forceTURN?: boolean; /** * Up to this many ICE candidates will be gathered when an incoming call arrives. * Gathering does not send data to the caller, but will communicate with the configured TURN * server. Default 0. */ iceCandidatePoolSize?: number; /** * True to advertise support for call transfers to other parties on Matrix calls. Default false. */ supportsCallTransfer?: boolean; /** * Whether to allow a fallback ICE server should be used for negotiating a * WebRTC connection if the homeserver doesn't provide any servers. Defaults to false. */ fallbackICEServerAllowed?: boolean; cryptoCallbacks?: ICryptoCallbacks; } export interface IMatrixClientCreateOpts extends ICreateClientOpts { /** * Whether to allow sending messages to encrypted rooms when encryption * is not available internally within this SDK. This is useful if you are using an external * E2E proxy, for example. Defaults to false. */ usingExternalCrypto?: boolean; } export enum PendingEventOrdering { Chronological = "chronological", Detached = "detached", } export interface IStartClientOpts { /** * The event <code>limit=</code> to apply to initial sync. Default: 8. */ initialSyncLimit?: number; /** * True to put <code>archived=true</code> on the <code>/initialSync</code> request. Default: false. */ includeArchivedRooms?: boolean; /** * True to do /profile requests on every invite event if the displayname/avatar_url is not known for this user ID. Default: false. */ resolveInvitesToProfiles?: boolean; /** * Controls where pending messages appear in a room's timeline. If "<b>chronological</b>", messages will * appear in the timeline when the call to <code>sendEvent</code> was made. If "<b>detached</b>", * pending messages will appear in a separate list, accessbile via {@link module:models/room#getPendingEvents}. * Default: "chronological". */ pendingEventOrdering?: PendingEventOrdering; /** * The number of milliseconds to wait on /sync. Default: 30000 (30 seconds). */ pollTimeout?: number; /** * The filter to apply to /sync calls. This will override the opts.initialSyncLimit, which would * normally result in a timeline limit filter. */ filter?: Filter; /** * True to perform syncing without automatically updating presence. */ disablePresence?: boolean; /** * True to not load all membership events during initial sync but fetch them when needed by calling * `loadOutOfBandMembers` This will override the filter option at this moment. */ lazyLoadMembers?: boolean; /** * The number of seconds between polls to /.well-known/matrix/client, undefined to disable. * This should be in the order of hours. Default: undefined. */ clientWellKnownPollPeriod?: number; /** * @experimental */ experimentalThreadSupport?: boolean; } export interface IStoredClientOpts extends IStartClientOpts { crypto: Crypto; canResetEntireTimeline: ResetTimelineCallback; } export enum RoomVersionStability { Stable = "stable", Unstable = "unstable", } export interface IRoomCapability { // MSC3244 preferred: string | null; support: string[]; } export interface IRoomVersionsCapability { default: string; available: Record<string, RoomVersionStability>; "org.matrix.msc3244.room_capabilities"?: Record<string, IRoomCapability>; // MSC3244 } export interface IChangePasswordCapability { enabled: boolean; } interface ICapabilities { [key: string]: any; "m.change_password"?: IChangePasswordCapability; "m.room_versions"?: IRoomVersionsCapability; } /* eslint-disable camelcase */ export interface ICrossSigningKey { keys: { [algorithm: string]: string }; signatures?: ISignatures; usage: string[]; user_id: string; } enum CrossSigningKeyType { MasterKey = "master_key", SelfSigningKey = "self_signing_key", UserSigningKey = "user_signing_key", } export type CrossSigningKeys = Record<CrossSigningKeyType, ICrossSigningKey>; export interface ISignedKey { keys: Record<string, string>; signatures: ISignatures; user_id: string; algorithms: string[]; device_id: string; } export type KeySignatures = Record<string, Record<string, ICrossSigningKey | ISignedKey>>; interface IUploadKeySignaturesResponse { failures: Record<string, Record<string, { errcode: string; error: string; }>>; } export interface IPreviewUrlResponse { [key: string]: string | number; "og:title": string; "og:type": string; "og:url": string; "og:image"?: string; "og:image:type"?: string; "og:image:height"?: number; "og:image:width"?: number; "og:description"?: string; "matrix:image:size"?: number; } interface ITurnServerResponse { uris: string[]; username: string; password: string; ttl: number; } interface ITurnServer { urls: string[]; username: string; credential: string; } interface IServerVersions { versions: string; unstable_features: Record<string, boolean>; } export interface IClientWellKnown { [key: string]: any; "m.homeserver"?: IWellKnownConfig; "m.identity_server"?: IWellKnownConfig; } export interface IWellKnownConfig { raw?: any; // todo typings action?: AutoDiscoveryAction; reason?: string; error?: Error | string; // eslint-disable-next-line base_url?: string | null; } interface IKeyBackupPath { path: string; queryData?: { version: string; }; } interface IMediaConfig { [key: string]: any; // extensible "m.upload.size"?: number; } interface IThirdPartySigned { sender: string; mxid: string; token: string; signatures: ISignatures; } interface IJoinRequestBody { third_party_signed?: IThirdPartySigned; } interface ITagMetadata { [key: string]: any; order: number; } interface IMessagesResponse { start: string; end: string; chunk: IRoomEvent[]; state: IStateEvent[]; } export interface IRequestTokenResponse { sid: string; submit_url?: string; } export interface IRequestMsisdnTokenResponse extends IRequestTokenResponse { msisdn: string; success: boolean; intl_fmt: string; } interface IUploadKeysRequest { device_keys?: Required<IDeviceKeys>; one_time_keys?: { [userId: string]: { [deviceId: string]: number; }; }; "org.matrix.msc2732.fallback_keys"?: Record<string, IOneTimeKey>; } interface IOpenIDToken { access_token: string; token_type: "Bearer" | string; matrix_server_name: string; expires_in: number; } interface IRoomInitialSyncResponse { room_id: string; membership: "invite" | "join" | "leave" | "ban"; messages?: { start?: string; end?: string; chunk: IEventWithRoomId[]; }; state?: IStateEventWithRoomId[]; visibility: Visibility; account_data?: IMinimalEvent[]; presence: Partial<IEvent>; // legacy and undocumented, api is deprecated so this won't get attention } interface IJoinedRoomsResponse { joined_rooms: string[]; } interface IJoinedMembersResponse { joined: { [userId: string]: { display_name: string; avatar_url: string; }; }; } export interface IPublicRoomsChunkRoom { room_id: string; name?: string; avatar_url?: string; topic?: string; canonical_alias?: string; aliases?: string[]; world_readable: boolean; guest_can_join: boolean; num_joined_members: number; } interface IPublicRoomsResponse { chunk: IPublicRoomsChunkRoom[]; next_batch?: string; prev_batch?: string; total_room_count_estimate?: number; } interface IUserDirectoryResponse { results: { user_id: string; display_name?: string; avatar_url?: string; }[]; limited: boolean; } export interface IMyDevice { device_id: string; display_name?: string; last_seen_ip?: string; last_seen_ts?: number; } interface IDownloadKeyResult { failures: { [serverName: string]: object }; device_keys: { [userId: string]: { [deviceId: string]: IDeviceKeys & { unsigned?: { device_display_name: string; }; }; }; }; } interface IClaimOTKsResult { failures: { [serverName: string]: object }; one_time_keys: { [userId: string]: { [deviceId: string]: string; }; }; } export interface IFieldType { regexp: string; placeholder: string; } export interface IInstance { desc: string; icon?: string; fields: object; network_id: string; // XXX: this is undocumented but we rely on it: https://github.com/matrix-org/matrix-doc/issues/3203 instance_id: string; } export interface IProtocol { user_fields: string[]; location_fields: string[]; icon: string; field_types: Record<string, IFieldType>; instances: IInstance[]; } interface IThirdPartyLocation { alias: string; protocol: string; fields: object; } interface IThirdPartyUser { userid: string; protocol: string; fields: object; } interface IRoomSummary extends Omit<IPublicRoomsChunkRoom, "canonical_alias" | "aliases"> { room_type?: RoomType; membership?: string; is_encrypted: boolean; } /* eslint-enable camelcase */ /** * Represents a Matrix Client. Only directly construct this if you want to use * custom modules. Normally, {@link createClient} should be used * as it specifies 'sensible' defaults for these modules. */ export class MatrixClient extends EventEmitter { public static readonly RESTORE_BACKUP_ERROR_BAD_KEY = 'RESTORE_BACKUP_ERROR_BAD_KEY'; public reEmitter = new ReEmitter(this); public olmVersion: [number, number, number] = null; // populated after initCrypto public usingExternalCrypto = false; public store: Store; public deviceId?: string; public credentials: { userId?: string }; public pickleKey: string; public scheduler: MatrixScheduler; public clientRunning = false; public timelineSupport = false; public urlPreviewCache: { [key: string]: Promise<IPreviewUrlResponse> } = {}; public unstableClientRelationAggregation = false; public identityServer: IIdentityServerProvider; public sessionStore: SessionStore; // XXX: Intended private, used in code. public http: MatrixHttpApi; // XXX: Intended private, used in code. public crypto: Crypto; // XXX: Intended private, used in code. public cryptoCallbacks: ICryptoCallbacks; // XXX: Intended private, used in code. public callEventHandler: CallEventHandler; // XXX: Intended private, used in code. public supportsCallTransfer = false; // XXX: Intended private, used in code. public forceTURN = false; // XXX: Intended private, used in code. public iceCandidatePoolSize = 0; // XXX: Intended private, used in code. public idBaseUrl: string; public baseUrl: string; // Note: these are all `protected` to let downstream consumers make mistakes if they want to. // We don't technically support this usage, but have reasons to do this. protected canSupportVoip = false; protected peekSync: SyncApi = null; protected isGuestAccount = false; protected ongoingScrollbacks: {[roomId: string]: {promise?: Promise<Room>, errorTs?: number}} = {}; protected notifTimelineSet: EventTimelineSet = null; protected cryptoStore: CryptoStore; protected verificationMethods: VerificationMethod[]; protected fallbackICEServerAllowed = false; protected roomList: RoomList; protected syncApi: SyncApi; public pushRules: any; // TODO: Types protected syncLeftRoomsPromise: Promise<Room[]>; protected syncedLeftRooms = false; protected clientOpts: IStoredClientOpts; protected clientWellKnownIntervalID: number; protected canResetTimelineCallback: ResetTimelineCallback; // The pushprocessor caches useful things, so keep one and re-use it protected pushProcessor = new PushProcessor(this); // Promise to a response of the server's /versions response // TODO: This should expire: https://github.com/matrix-org/matrix-js-sdk/issues/1020 protected serverVersionsPromise: Promise<IServerVersions>; protected cachedCapabilities: { capabilities: ICapabilities; expiration: number; }; protected clientWellKnown: IClientWellKnown; protected clientWellKnownPromise: Promise<IClientWellKnown>; protected turnServers: ITurnServer[] = []; protected turnServersExpiry = 0; protected checkTurnServersIntervalID: number; protected exportedOlmDeviceToImport: IOlmDevice; protected txnCtr = 0; protected mediaHandler = new MediaHandler(); constructor(opts: IMatrixClientCreateOpts) { super(); opts.baseUrl = utils.ensureNoTrailingSlash(opts.baseUrl); opts.idBaseUrl = utils.ensureNoTrailingSlash(opts.idBaseUrl); this.baseUrl = opts.baseUrl; this.idBaseUrl = opts.idBaseUrl; this.usingExternalCrypto = opts.usingExternalCrypto; this.store = opts.store || new StubStore(); this.deviceId = opts.deviceId || null; const userId = opts.userId || null; this.credentials = { userId }; this.http = new MatrixHttpApi(this, { baseUrl: opts.baseUrl, idBaseUrl: opts.idBaseUrl, accessToken: opts.accessToken, request: opts.request, prefix: PREFIX_R0, onlyData: true, extraParams: opts.queryParams, localTimeoutMs: opts.localTimeoutMs, useAuthorizationHeader: opts.useAuthorizationHeader, }); if (opts.deviceToImport) { if (this.deviceId) { logger.warn( 'not importing device because device ID is provided to ' + 'constructor independently of exported data', ); } else if (this.credentials.userId) { logger.warn( 'not importing device because user ID is provided to ' + 'constructor independently of exported data', ); } else if (!opts.deviceToImport.deviceId) { logger.warn('not importing device because no device ID in exported data'); } else { this.deviceId = opts.deviceToImport.deviceId; this.credentials.userId = opts.deviceToImport.userId; // will be used during async initialization of the crypto this.exportedOlmDeviceToImport = opts.deviceToImport.olmDevice; } } else if (opts.pickleKey) { this.pickleKey = opts.pickleKey; } this.scheduler = opts.scheduler; if (this.scheduler) { this.scheduler.setProcessFunction(async (eventToSend) => { const room = this.getRoom(eventToSend.getRoomId()); if (eventToSend.status !== EventStatus.SENDING) { this.updatePendingEventStatus(room, eventToSend, EventStatus.SENDING); } const res = await this.sendEventHttpRequest(eventToSend); if (room) { // ensure we update pending event before the next scheduler run so that any listeners to event id // updates on the synchronous event emitter get a chance to run first. room.updatePendingEvent(eventToSend, EventStatus.SENT, res.event_id); } return res; }); } // try constructing a MatrixCall to see if we are running in an environment // which has WebRTC. If we are, listen for and handle m.call.* events. const call = createNewMatrixCall(this, undefined, undefined); if (call) { this.callEventHandler = new CallEventHandler(this); this.canSupportVoip = true; // Start listening for calls after the initial sync is done // We do not need to backfill the call event buffer // with encrypted events that might never get decrypted this.on("sync", this.startCallEventHandler); } this.timelineSupport = Boolean(opts.timelineSupport); this.unstableClientRelationAggregation = !!opts.unstableClientRelationAggregation; this.cryptoStore = opts.cryptoStore; this.sessionStore = opts.sessionStore; this.verificationMethods = opts.verificationMethods; this.cryptoCallbacks = opts.cryptoCallbacks || {}; this.forceTURN = opts.forceTURN || false; this.iceCandidatePoolSize = opts.iceCandidatePoolSize === undefined ? 0 : opts.iceCandidatePoolSize; this.supportsCallTransfer = opts.supportsCallTransfer || false; this.fallbackICEServerAllowed = opts.fallbackICEServerAllowed || false; // List of which rooms have encryption enabled: separate from crypto because // we still want to know which rooms are encrypted even if crypto is disabled: // we don't want to start sending unencrypted events to them. this.roomList = new RoomList(this.cryptoStore); // The SDK doesn't really provide a clean way for events to recalculate the push // actions for themselves, so we have to kinda help them out when they are encrypted. // We do this so that push rules are correctly executed on events in their decrypted // state, such as highlights when the user's name is mentioned. this.on("Event.decrypted", (event) => { const oldActions = event.getPushActions(); const actions = this.pushProcessor.actionsForEvent(event); event.setPushActions(actions); // Might as well while we're here const room = this.getRoom(event.getRoomId()); if (!room) return; const currentCount = room.getUnreadNotificationCount(NotificationCountType.Highlight); // Ensure the unread counts are kept up to date if the event is encrypted // We also want to make sure that the notification count goes up if we already // have encrypted events to avoid other code from resetting 'highlight' to zero. const oldHighlight = oldActions && oldActions.tweaks ? !!oldActions.tweaks.highlight : false; const newHighlight = actions && actions.tweaks ? !!actions.tweaks.highlight : false; if (oldHighlight !== newHighlight || currentCount > 0) { // TODO: Handle mentions received while the client is offline // See also https://github.com/vector-im/element-web/issues/9069 if (!room.hasUserReadEvent(this.getUserId(), event.getId())) { let newCount = currentCount; if (newHighlight && !oldHighlight) newCount++; if (!newHighlight && oldHighlight) newCount--; room.setUnreadNotificationCount(NotificationCountType.Highlight, newCount); // Fix 'Mentions Only' rooms from not having the right badge count const totalCount = room.getUnreadNotificationCount(NotificationCountType.Total); if (totalCount < newCount) { room.setUnreadNotificationCount(NotificationCountType.Total, newCount); } } } }); // Like above, we have to listen for read receipts from ourselves in order to // correctly handle notification counts on encrypted rooms. // This fixes https://github.com/vector-im/element-web/issues/9421 this.on("Room.receipt", (event, room) => { if (room && this.isRoomEncrypted(room.roomId)) { // Figure out if we've read something or if it's just informational const content = event.getContent(); const isSelf = Object.keys(content).filter(eid => { return Object.keys(content[eid]['m.read']).includes(this.getUserId()); }).length > 0; if (!isSelf) return; // Work backwards to determine how many events are unread. We also set // a limit for how back we'll look to avoid spinning CPU for too long. // If we hit the limit, we assume the count is unchanged. const maxHistory = 20; const events = room.getLiveTimeline().getEvents(); let highlightCount = 0; for (let i = events.length - 1; i >= 0; i--) { if (i === events.length - maxHistory) return; // limit reached const event = events[i]; if (room.hasUserReadEvent(this.getUserId(), event.getId())) { // If the user has read the event, then the counting is done. break; } const pushActions = this.getPushActionsForEvent(event); highlightCount += pushActions.tweaks && pushActions.tweaks.highlight ? 1 : 0; } // Note: we don't need to handle 'total' notifications because the counts // will come from the server. room.setUnreadNotificationCount("highlight", highlightCount); } }); } /** * High level helper method to begin syncing and poll for new events. To listen for these * events, add a listener for {@link module:client~MatrixClient#event:"event"} * via {@link module:client~MatrixClient#on}. Alternatively, listen for specific * state change events. * @param {Object=} opts Options to apply when syncing. */ public async startClient(opts: IStartClientOpts) { if (this.clientRunning) { // client is already running. return; } this.clientRunning = true; // backwards compat for when 'opts' was 'historyLen'. if (typeof opts === "number") { opts = { initialSyncLimit: opts, }; } // Create our own user object artificially (instead of waiting for sync) // so it's always available, even if the user is not in any rooms etc. const userId = this.getUserId(); if (userId) { this.store.storeUser(new User(userId)); } if (this.crypto) { this.crypto.uploadDeviceKeys(); this.crypto.start(); } // periodically poll for turn servers if we support voip if (this.canSupportVoip) { this.checkTurnServersIntervalID = setInterval(() => { this.checkTurnServers(); }, TURN_CHECK_INTERVAL); // noinspection ES6MissingAwait this.checkTurnServers(); } if (this.syncApi) { // This shouldn't happen since we thought the client was not running logger.error("Still have sync object whilst not running: stopping old one"); this.syncApi.stop(); } // shallow-copy the opts dict before modifying and storing it this.clientOpts = Object.assign({}, opts) as IStoredClientOpts; this.clientOpts.crypto = this.crypto; this.clientOpts.canResetEntireTimeline = (roomId) => { if (!this.canResetTimelineCallback) { return false; } return this.canResetTimelineCallback(roomId); }; this.syncApi = new SyncApi(this, this.clientOpts); this.syncApi.sync(); if (this.clientOpts.clientWellKnownPollPeriod !== undefined) { this.clientWellKnownIntervalID = setInterval(() => { this.fetchClientWellKnown(); }, 1000 * this.clientOpts.clientWellKnownPollPeriod); this.fetchClientWellKnown(); } } /** * High level helper method to stop the client from polling and allow a * clean shutdown. */ public stopClient() { logger.log('stopping MatrixClient'); this.clientRunning = false; this.syncApi?.stop(); this.syncApi = null; this.crypto?.stop(); this.peekSync?.stopPeeking(); this.callEventHandler?.stop(); this.callEventHandler = null; global.clearInterval(this.checkTurnServersIntervalID); if (this.clientWellKnownIntervalID !== undefined) { global.clearInterval(this.clientWellKnownIntervalID); } } /** * Try to rehydrate a device if available. The client must have been * initialized with a `cryptoCallback.getDehydrationKey` option, and this * function must be called before initCrypto and startClient are called. * * @return {Promise<string>} Resolves to undefined if a device could not be dehydrated, or * to the new device ID if the dehydration was successful. * @return {module:http-api.MatrixError} Rejects: with an error response. */ public async rehydrateDevice(): Promise<string> { if (this.crypto) { throw new Error("Cannot rehydrate device after crypto is initialized"); } if (!this.cryptoCallbacks.getDehydrationKey) { return; } const getDeviceResult = await this.getDehydratedDevice(); if (!getDeviceResult) { return; } if (!getDeviceResult.device_data || !getDeviceResult.device_id) { logger.info("no dehydrated device found"); return; } const account = new global.Olm.Account(); try { const deviceData = getDeviceResult.device_data; if (deviceData.algorithm !== DEHYDRATION_ALGORITHM) { logger.warn("Wrong algorithm for dehydrated device"); return; } logger.log("unpickling dehydrated device"); const key = await this.cryptoCallbacks.getDehydrationKey( deviceData, (k) => { // copy the key so that it doesn't get clobbered account.unpickle(new Uint8Array(k), deviceData.account); }, ); account.unpickle(key, deviceData.account); logger.log("unpickled device"); const rehydrateResult = await this.http.authedRequest( undefined, "POST", "/dehydrated_device/claim", undefined, { device_id: getDeviceResult.device_id, }, { prefix: "/_matrix/client/unstable/org.matrix.msc2697.v2", }, ); if (rehydrateResult.success === true) { this.deviceId = getDeviceResult.device_id; logger.info("using dehydrated device"); const pickleKey = this.pickleKey || "DEFAULT_KEY"; this.exportedOlmDeviceToImport = { pickledAccount: account.pickle(pickleKey), sessions: [], pickleKey: pickleKey, }; account.free(); return this.deviceId; } else { account.free(); logger.info("not using dehydrated device"); return; } } catch (e) { account.free(); logger.warn("could not unpickle", e); } } /** * Get the current dehydrated device, if any * @return {Promise} A promise of an object containing the dehydrated device */ public async getDehydratedDevice(): Promise<IDehydratedDevice> { try { return await this.http.authedRequest( undefined, "GET", "/dehydrated_device", undefined, undefined, { prefix: "/_matrix/client/unstable/org.matrix.msc2697.v2", }, ); } catch (e) { logger.info("could not get dehydrated device", e.toString()); return; } } /** * Set the dehydration key. This will also periodically dehydrate devices to * the server. * * @param {Uint8Array} key the dehydration key * @param {IDehydratedDeviceKeyInfo} [keyInfo] Information about the key. Primarily for * information about how to generate the key from a passphrase. * @param {string} [deviceDisplayName] The device display name for the * dehydrated device. * @return {Promise} A promise that resolves when the dehydrated device is stored. */ public async setDehydrationKey( key: Uint8Array, keyInfo: IDehydratedDeviceKeyInfo, deviceDisplayName?: string, ): Promise<void> { if (!this.crypto) { logger.warn('not dehydrating device if crypto is not enabled'); return; } // XXX: Private member access. return await this.crypto.dehydrationManager.setKeyAndQueueDehydration( key, keyInfo, deviceDisplayName, ); } /** * Creates a new dehydrated device (without queuing periodic dehydration) * @param {Uint8Array} key the dehydration key * @param {IDehydratedDeviceKeyInfo} [keyInfo] Information about the key. Primarily for * information about how to generate the key from a passphrase. * @param {string} [deviceDisplayName] The device display name for the * dehydrated device. * @return {Promise<String>} the device id of the newly created dehydrated device */ public async createDehydratedDevice( key: Uint8Array, keyInfo: IDehydratedDeviceKeyInfo, deviceDisplayName?: string, ): Promise<string> { if (!this.crypto) { logger.warn('not dehydrating device if crypto is not enabled'); return; } await this.crypto.dehydrationManager.setKey( key, keyInfo, deviceDisplayName, ); // XXX: Private member access. return await this.crypto.dehydrationManager.dehydrateDevice(); } public async exportDevice(): Promise<IExportedDevice> { if (!this.crypto) { logger.warn('not exporting device if crypto is not enabled'); return; } return { userId: this.credentials.userId, deviceId: this.deviceId, // XXX: Private member access. olmDevice: await this.crypto.olmDevice.export(), }; } /** * Clear any data out of the persistent stores used by the client. * * @returns {Promise} Promise which resolves when the stores have been cleared. */ public clearStores(): Promise<void> { if (this.clientRunning) { throw new Error("Cannot clear stores while client is running"); } const promises = []; promises.push(this.store.deleteAllData()); if (this.cryptoStore) { promises.push(this.cryptoStore.deleteAllData()); } return Promise.all(promises).then(); // .then to fix types } /** * Get the user-id of the logged-in user * * @return {?string} MXID for the logged-in user, or null if not logged in */ public getUserId(): string { if (this.credentials && this.credentials.userId) { return this.credentials.userId; } return null; } /** * Get the domain for this client's MXID * @return {?string} Domain of this MXID */ public getDomain(): string { if (this.credentials && this.credentials.userId) { return this.credentials.userId.replace(/^.*?:/, ''); } return null; } /** * Get the local part of the current user ID e.g. "foo" in "@foo:bar". * @return {?string} The user ID localpart or null. */ public getUserIdLocalpart(): string { if (this.credentials && this.credentials.userId) { return this.credentials.userId.split(":")[0].substring(1); } return null; } /** * Get the device ID of this client * @return {?string} device ID */ public getDeviceId(): string { return this.deviceId; } /** * Check if the runtime environment supports VoIP calling. * @return {boolean} True if VoIP is supported. */ public supportsVoip(): boolean { return this.canSupportVoip; } /** * @returns {MediaHandler} */ public getMediaHandler(): MediaHandler { return this.mediaHandler; } /** * Set whether VoIP calls are forced to use only TURN * candidates. This is the same as the forceTURN option * when creating the client. * @param {boolean} force True to force use of TURN servers */ public setForceTURN(force: boolean) { this.forceTURN = force; } /** * Set whether to advertise transfer support to other parties on Matrix calls. * @param {boolean} support True to advertise the 'm.call.transferee' capability */ public setSupportsCallTransfer(support: boolean) { this.supportsCallTransfer = support; } /** * Creates a new call. * The place*Call methods on the returned call can be used to actually place a call * * @param {string} roomId The room the call is to be placed in. * @return {MatrixCall} the call or null if the browser doesn't support calling. */ public createCall(roomId: string): MatrixCall { return createNewMatrixCall(this, roomId); } /** * Get the current sync state. * @return {?SyncState} the sync state, which may be null. * @see module:client~MatrixClient#event:"sync" */ public getSyncState(): SyncState { if (!this.syncApi) { return null; } return this.syncApi.getSyncState(); } /** * Returns the additional data object associated with * the current sync state, or null if there is no * such data. * Sync errors, if available, are put in the 'error' key of * this object. * @return {?Object} */ public getSyncStateData(): ISyncStateData | null { if (!this.syncApi) { return null; } return this.syncApi.getSyncStateData(); } /** * Whether the initial sync has completed. * @return {boolean} True if at least one sync has happened. */ public isInitialSyncComplete(): boolean { const state = this.getSyncState(); if (!state) { return false; } return state === SyncState.Prepared || state === SyncState.Syncing; } /** * Return whether the client is configured for a guest account. * @return {boolean} True if this is a guest access_token (or no token is supplied). */ public isGuest(): boolean { return this.isGuestAccount; } /** * Set whether this client is a guest account. <b>This method is experimental * and may change without warning.</b> * @param {boolean} guest True if this is a guest account. */ public setGuest(guest: boolean) { // EXPERIMENTAL: // If the token is a macaroon, it should be encoded in it that it is a 'guest' // access token, which means that the SDK can determine this entirely without // the dev manually flipping this flag. this.isGuestAccount = guest; } /** * Return the provided scheduler, if any. * @return {?module:scheduler~MatrixScheduler} The scheduler or null */ public getScheduler(): MatrixScheduler { return this.scheduler; } /** * Retry a backed off syncing request immediately. This should only be used when * the user <b>explicitly</b> attempts to retry their lost connection. * @return {boolean} True if this resulted in a request being retried. */ public retryImmediately(): boolean { return this.syncApi.retryImmediately(); } /** * Return the global notification EventTimelineSet, if any * * @return {EventTimelineSet} the globl notification EventTimelineSet */ public getNotifTimelineSet(): EventTimelineSet { return this.notifTimelineSet; } /** * Set the global notification EventTimelineSet * * @param {EventTimelineSet} set */ public setNotifTimelineSet(set: EventTimelineSet) { this.notifTimelineSet = set; } /** * Gets the capabilities of the homeserver. Always returns an object of * capability keys and their options, which may be empty. * @param {boolean} fresh True to ignore any cached values. * @return {Promise} Resolves to the capabilities of the homeserver * @return {module:http-api.MatrixError} Rejects: with an error response. */ public getCapabilities(fresh = false): Promise<ICapabilities> { const now = new Date().getTime(); if (this.cachedCapabilities && !fresh) { if (now < this.cachedCapabilities.expiration) { logger.log("Returning cached capabilities"); return Promise.resolve(this.cachedCapabilities.capabilities); } } // We swallow errors because we need a default object anyhow return this.http.authedRequest( undefined, "GET", "/capabilities", ).catch((e) => { logger.error(e); return null; // otherwise consume the error }).then((r) => { if (!r) r = {}; const capabilities: ICapabilities = r["capabilities"] || {}; // If the capabilities missed the cache, cache it for a shorter amount // of time to try and refresh them later. const cacheMs = Object.keys(capabilities).length ? CAPABILITIES_CACHE_MS : 60000 + (Math.random() * 5000); this.cachedCapabilities = { capabilities, expiration: now + cacheMs, }; logger.log("Caching capabilities: ", capabilities); return capabilities; }); } /** * Initialise support for end-to-end encryption in this client * * You should call this method after creating the matrixclient, but *before* * calling `startClient`, if you want to support end-to-end encryption. * * It will return a Promise which will resolve when the crypto layer has been * successfully initialised. */ public async initCrypto(): Promise<void> { if (!isCryptoAvailable()) { throw new Error( `End-to-end encryption not supported in this js-sdk build: did ` + `you remember to load the olm library?`, ); } if (this.crypto) { logger.warn("Attempt to re-initialise e2e encryption on MatrixClient"); return; } if (!this.sessionStore) { // this is temporary, the sessionstore is supposed to be going away throw new Error(`Cannot enable encryption: no sessionStore provided`); } if (!this.cryptoStore) {