UNPKG

matrix-js-sdk

Version:
1,483 lines (1,304 loc) 356 kB
/* Copyright 2015-2021 The Matrix.org Foundation C.I.C. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ /** * This is an internal module. See {@link MatrixClient} for the public class. * @module client */ import { EmoteEvent, IPartialEvent, MessageEvent, NoticeEvent } from "matrix-events-sdk"; import { ISyncStateData, SyncApi, SyncState } from "./sync"; import { EventStatus, IContent, IDecryptOptions, IEvent, MatrixEvent, MatrixEventEvent, MatrixEventHandlerMap, } from "./models/event"; import { StubStore } from "./store/stub"; import { CallEvent, CallEventHandlerMap, createNewMatrixCall, MatrixCall, supportsMatrixCall } from "./webrtc/call"; import { Filter, IFilterDefinition } from "./filter"; import { CallEventHandlerEvent, CallEventHandler, CallEventHandlerEventHandlerMap } from './webrtc/callEventHandler'; import * as utils from './utils'; import { sleep } from './utils'; import { Direction, EventTimeline } from "./models/event-timeline"; import { IActionsObject, PushProcessor } from "./pushprocessor"; import { AutoDiscovery, AutoDiscoveryAction } from "./autodiscovery"; import * as olmlib from "./crypto/olmlib"; import { decodeBase64, encodeBase64 } from "./crypto/olmlib"; import { IExportedDevice as IOlmDevice } from "./crypto/OlmDevice"; import { TypedReEmitter } from './ReEmitter'; import { IRoomEncryption, RoomList } from './crypto/RoomList'; import { logger } from './logger'; import { SERVICE_TYPES } from './service-types'; import { FileType, HttpApiEvent, HttpApiEventHandlerMap, IHttpOpts, IUpload, MatrixError, MatrixHttpApi, Method, PREFIX_IDENTITY_V2, PREFIX_MEDIA_R0, PREFIX_R0, PREFIX_UNSTABLE, PREFIX_V1, PREFIX_V3, retryNetworkOperation, UploadContentResponseType, } from "./http-api"; import { Crypto, CryptoEvent, CryptoEventHandlerMap, fixBackupKey, IBootstrapCrossSigningOpts, ICheckOwnCrossSigningTrustOpts, IMegolmSessionData, isCryptoAvailable, VerificationMethod, } from './crypto'; import { DeviceInfo, IDevice } from "./crypto/deviceinfo"; import { decodeRecoveryKey } from './crypto/recoverykey'; import { keyFromAuthData } from './crypto/key_passphrase'; import { User, UserEvent, UserEventHandlerMap } from "./models/user"; import { getHttpUriForMxc } from "./content-repo"; import { SearchResult } from "./models/search-result"; import { DEHYDRATION_ALGORITHM, IDehydratedDevice, IDehydratedDeviceKeyInfo, IDeviceKeys, IOneTimeKey, } from "./crypto/dehydration"; import { IKeyBackupInfo, IKeyBackupPrepareOpts, IKeyBackupRestoreOpts, IKeyBackupRestoreResult, IKeyBackupRoomSessions, IKeyBackupSession, } from "./crypto/keybackup"; import { IIdentityServerProvider } from "./@types/IIdentityServerProvider"; import { MatrixScheduler } from "./scheduler"; import { IAuthData, ICryptoCallbacks, IMinimalEvent, IRoomEvent, IStateEvent, NotificationCountType, BeaconEvent, BeaconEventHandlerMap, RoomEvent, RoomEventHandlerMap, RoomMemberEvent, RoomMemberEventHandlerMap, RoomStateEvent, RoomStateEventHandlerMap, INotificationsResponse, IFilterResponse, ITagsResponse, IStatusResponse, IPushRule, PushRuleActionName, IAuthDict, } from "./matrix"; import { CrossSigningKey, IAddSecretStorageKeyOpts, ICreateSecretStorageOpts, IEncryptedEventInfo, IImportRoomKeysOpts, IRecoveryKey, ISecretStorageKeyInfo, } from "./crypto/api"; import { EventTimelineSet } from "./models/event-timeline-set"; import { VerificationRequest } from "./crypto/verification/request/VerificationRequest"; import { VerificationBase as Verification } from "./crypto/verification/Base"; import * as ContentHelpers from "./content-helpers"; import { CrossSigningInfo, DeviceTrustLevel, ICacheCallbacks, UserTrustLevel } from "./crypto/CrossSigning"; import { Room } from "./models/room"; import { IAddThreePidOnlyBody, IBindThreePidBody, IContextResponse, ICreateRoomOpts, IEventSearchOpts, IGuestAccessOpts, IJoinRoomOpts, IPaginateOpts, IPresenceOpts, IRedactOpts, IRelationsRequestOpts, IRelationsResponse, IRoomDirectoryOptions, ISearchOpts, ISendEventResponse, IUploadOpts, } from "./@types/requests"; import { EventType, MsgType, RelationType, RoomCreateTypeField, RoomType, UNSTABLE_MSC3088_ENABLED, UNSTABLE_MSC3088_PURPOSE, UNSTABLE_MSC3089_TREE_SUBTYPE, } from "./@types/event"; import { IAbortablePromise, IdServerUnbindResult, IImageInfo, Preset, Visibility } from "./@types/partials"; import { EventMapper, eventMapperFor, MapperOpts } from "./event-mapper"; import { randomString } from "./randomstring"; import { WebStorageSessionStore } from "./store/session/webstorage"; import { BackupManager, IKeyBackup, IKeyBackupCheck, IPreparedKeyBackupVersion, TrustInfo } from "./crypto/backup"; import { DEFAULT_TREE_POWER_LEVELS_TEMPLATE, MSC3089TreeSpace } from "./models/MSC3089TreeSpace"; import { ISignatures } from "./@types/signed"; import { IStore } from "./store"; import { ISecretRequest } from "./crypto/SecretStorage"; import { IEventWithRoomId, ISearchRequestBody, ISearchResponse, ISearchResults, IStateEventWithRoomId, SearchOrderBy, } from "./@types/search"; import { ISynapseAdminDeactivateResponse, ISynapseAdminWhoisResponse } from "./@types/synapse"; import { IHierarchyRoom } from "./@types/spaces"; import { IPusher, IPusherRequest, IPushRules, PushRuleAction, PushRuleKind, RuleId } from "./@types/PushRules"; import { IThreepid } from "./@types/threepids"; import { CryptoStore } from "./crypto/store/base"; import { MediaHandler } from "./webrtc/mediaHandler"; import { IRefreshTokenResponse } from "./@types/auth"; import { TypedEventEmitter } from "./models/typed-event-emitter"; import { ReceiptType } from "./@types/read_receipts"; import { Thread, THREAD_RELATION_TYPE } from "./models/thread"; import { MBeaconInfoEventContent, M_BEACON_INFO } from "./@types/beacon"; export type Store = IStore; export type SessionStore = WebStorageSessionStore; export type Callback<T = any> = (err: Error | any | null, data?: T) => void; export type ResetTimelineCallback = (roomId: string) => boolean; const SCROLLBACK_DELAY_MS = 3000; export const CRYPTO_ENABLED: boolean = isCryptoAvailable(); const CAPABILITIES_CACHE_MS = 21600000; // 6 hours - an arbitrary value const TURN_CHECK_INTERVAL = 10 * 60 * 1000; // poll for turn credentials every 10 minutes interface IExportedDevice { olmDevice: IOlmDevice; userId: string; deviceId: string; } export interface IKeysUploadResponse { one_time_key_counts: { // eslint-disable-line camelcase [algorithm: string]: number; }; } export interface ICreateClientOpts { baseUrl: string; idBaseUrl?: string; /** * The data store used for sync data from the homeserver. If not specified, * this client will not store any HTTP responses. The `createClient` helper * will create a default store if needed. */ store?: Store; /** * A store to be used for end-to-end crypto session data. If not specified, * end-to-end crypto will be disabled. The `createClient` helper will create * a default store if needed. */ cryptoStore?: CryptoStore; /** * The scheduler to use. If not * specified, this client will not retry requests on failure. This client * will supply its own processing function to * {@link module:scheduler~MatrixScheduler#setProcessFunction}. */ scheduler?: MatrixScheduler; /** * The function to invoke for HTTP * requests. The value of this property is typically <code>require("request") * </code> as it returns a function which meets the required interface. See * {@link requestFunction} for more information. */ request?: IHttpOpts["request"]; userId?: string; /** * A unique identifier for this device; used for tracking things like crypto * keys and access tokens. If not specified, end-to-end encryption will be * disabled. */ deviceId?: string; accessToken?: string; /** * Identity server provider to retrieve the user's access token when accessing * the identity server. See also https://github.com/vector-im/element-web/issues/10615 * which seeks to replace the previous approach of manual access tokens params * with this callback throughout the SDK. */ identityServer?: IIdentityServerProvider; /** * The default maximum amount of * time to wait before timing out HTTP requests. If not specified, there is no timeout. */ localTimeoutMs?: number; /** * Set to true to use * Authorization header instead of query param to send the access token to the server. * * Default false. */ useAuthorizationHeader?: boolean; /** * Set to true to enable * improved timeline support ({@link module:client~MatrixClient#getEventTimeline getEventTimeline}). It is * disabled by default for compatibility with older clients - in particular to * maintain support for back-paginating the live timeline after a '/sync' * result with a gap. */ timelineSupport?: boolean; /** * Extra query parameters to append * to all requests with this client. Useful for application services which require * <code>?user_id=</code>. */ queryParams?: Record<string, string>; /** * Device data exported with * "exportDevice" method that must be imported to recreate this device. * Should only be useful for devices with end-to-end crypto enabled. * If provided, deviceId and userId should **NOT** be provided at the top * level (they are present in the exported data). */ deviceToImport?: IExportedDevice; /** * Key used to pickle olm objects or other sensitive data. */ pickleKey?: string; /** * A store to be used for end-to-end crypto session data. Most data has been * migrated out of here to `cryptoStore` instead. If not specified, * end-to-end crypto will be disabled. The `createClient` helper * _will not_ create this store at the moment. */ sessionStore?: SessionStore; /** * Set to true to enable client-side aggregation of event relations * via `EventTimelineSet#getRelationsForEvent`. * This feature is currently unstable and the API may change without notice. */ unstableClientRelationAggregation?: boolean; verificationMethods?: Array<VerificationMethod>; /** * Whether relaying calls through a TURN server should be forced. Default false. */ forceTURN?: boolean; /** * Up to this many ICE candidates will be gathered when an incoming call arrives. * Gathering does not send data to the caller, but will communicate with the configured TURN * server. Default 0. */ iceCandidatePoolSize?: number; /** * True to advertise support for call transfers to other parties on Matrix calls. Default false. */ supportsCallTransfer?: boolean; /** * Whether to allow a fallback ICE server should be used for negotiating a * WebRTC connection if the homeserver doesn't provide any servers. Defaults to false. */ fallbackICEServerAllowed?: boolean; cryptoCallbacks?: ICryptoCallbacks; } export interface IMatrixClientCreateOpts extends ICreateClientOpts { /** * Whether to allow sending messages to encrypted rooms when encryption * is not available internally within this SDK. This is useful if you are using an external * E2E proxy, for example. Defaults to false. */ usingExternalCrypto?: boolean; } export enum PendingEventOrdering { Chronological = "chronological", Detached = "detached", } export interface IStartClientOpts { /** * The event <code>limit=</code> to apply to initial sync. Default: 8. */ initialSyncLimit?: number; /** * True to put <code>archived=true</code> on the <code>/initialSync</code> request. Default: false. */ includeArchivedRooms?: boolean; /** * True to do /profile requests on every invite event if the displayname/avatar_url is not known for this user ID. Default: false. */ resolveInvitesToProfiles?: boolean; /** * Controls where pending messages appear in a room's timeline. If "<b>chronological</b>", messages will * appear in the timeline when the call to <code>sendEvent</code> was made. If "<b>detached</b>", * pending messages will appear in a separate list, accessbile via {@link module:models/room#getPendingEvents}. * Default: "chronological". */ pendingEventOrdering?: PendingEventOrdering; /** * The number of milliseconds to wait on /sync. Default: 30000 (30 seconds). */ pollTimeout?: number; /** * The filter to apply to /sync calls. This will override the opts.initialSyncLimit, which would * normally result in a timeline limit filter. */ filter?: Filter; /** * True to perform syncing without automatically updating presence. */ disablePresence?: boolean; /** * True to not load all membership events during initial sync but fetch them when needed by calling * `loadOutOfBandMembers` This will override the filter option at this moment. */ lazyLoadMembers?: boolean; /** * The number of seconds between polls to /.well-known/matrix/client, undefined to disable. * This should be in the order of hours. Default: undefined. */ clientWellKnownPollPeriod?: number; /** * @experimental */ experimentalThreadSupport?: boolean; } export interface IStoredClientOpts extends IStartClientOpts { crypto: Crypto; canResetEntireTimeline: ResetTimelineCallback; } export enum RoomVersionStability { Stable = "stable", Unstable = "unstable", } export interface IRoomCapability { // MSC3244 preferred: string | null; support: string[]; } export interface IRoomVersionsCapability { default: string; available: Record<string, RoomVersionStability>; "org.matrix.msc3244.room_capabilities"?: Record<string, IRoomCapability>; // MSC3244 } export interface ICapability { enabled: boolean; } export interface IChangePasswordCapability extends ICapability {} export interface IThreadsCapability extends ICapability {} interface ICapabilities { [key: string]: any; "m.change_password"?: IChangePasswordCapability; "m.room_versions"?: IRoomVersionsCapability; "io.element.thread"?: IThreadsCapability; } /* eslint-disable camelcase */ export interface ICrossSigningKey { keys: { [algorithm: string]: string }; signatures?: ISignatures; usage: string[]; user_id: string; } enum CrossSigningKeyType { MasterKey = "master_key", SelfSigningKey = "self_signing_key", UserSigningKey = "user_signing_key", } export type CrossSigningKeys = Record<CrossSigningKeyType, ICrossSigningKey>; export interface ISignedKey { keys: Record<string, string>; signatures: ISignatures; user_id: string; algorithms: string[]; device_id: string; } export type KeySignatures = Record<string, Record<string, ICrossSigningKey | ISignedKey>>; export interface IUploadKeySignaturesResponse { failures: Record<string, Record<string, { errcode: string; error: string; }>>; } export interface IPreviewUrlResponse { [key: string]: string | number; "og:title": string; "og:type": string; "og:url": string; "og:image"?: string; "og:image:type"?: string; "og:image:height"?: number; "og:image:width"?: number; "og:description"?: string; "matrix:image:size"?: number; } interface ITurnServerResponse { uris: string[]; username: string; password: string; ttl: number; } interface ITurnServer { urls: string[]; username: string; credential: string; } interface IServerVersions { versions: string[]; unstable_features: Record<string, boolean>; } export interface IClientWellKnown { [key: string]: any; "m.homeserver"?: IWellKnownConfig; "m.identity_server"?: IWellKnownConfig; } export interface IWellKnownConfig { raw?: any; // todo typings action?: AutoDiscoveryAction; reason?: string; error?: Error | string; // eslint-disable-next-line base_url?: string | null; } interface IKeyBackupPath { path: string; queryData?: { version: string; }; } interface IMediaConfig { [key: string]: any; // extensible "m.upload.size"?: number; } interface IThirdPartySigned { sender: string; mxid: string; token: string; signatures: ISignatures; } interface IJoinRequestBody { third_party_signed?: IThirdPartySigned; } interface ITagMetadata { [key: string]: any; order: number; } interface IMessagesResponse { start: string; end: string; chunk: IRoomEvent[]; state: IStateEvent[]; } export interface IRequestTokenResponse { sid: string; submit_url?: string; } export interface IRequestMsisdnTokenResponse extends IRequestTokenResponse { msisdn: string; success: boolean; intl_fmt: string; } interface IUploadKeysRequest { device_keys?: Required<IDeviceKeys>; one_time_keys?: { [userId: string]: { [deviceId: string]: number; }; }; "org.matrix.msc2732.fallback_keys"?: Record<string, IOneTimeKey>; } interface IOpenIDToken { access_token: string; token_type: "Bearer" | string; matrix_server_name: string; expires_in: number; } interface IRoomInitialSyncResponse { room_id: string; membership: "invite" | "join" | "leave" | "ban"; messages?: { start?: string; end?: string; chunk: IEventWithRoomId[]; }; state?: IStateEventWithRoomId[]; visibility: Visibility; account_data?: IMinimalEvent[]; presence: Partial<IEvent>; // legacy and undocumented, api is deprecated so this won't get attention } interface IJoinedRoomsResponse { joined_rooms: string[]; } interface IJoinedMembersResponse { joined: { [userId: string]: { display_name: string; avatar_url: string; }; }; } export interface IRegisterRequestParams { auth?: IAuthData; username?: string; password?: string; refresh_token?: boolean; guest_access_token?: string; x_show_msisdn?: boolean; bind_msisdn?: boolean; bind_email?: boolean; inhibit_login?: boolean; initial_device_display_name?: string; } export interface IPublicRoomsChunkRoom { room_id: string; name?: string; avatar_url?: string; topic?: string; canonical_alias?: string; aliases?: string[]; world_readable: boolean; guest_can_join: boolean; num_joined_members: number; } interface IPublicRoomsResponse { chunk: IPublicRoomsChunkRoom[]; next_batch?: string; prev_batch?: string; total_room_count_estimate?: number; } interface IUserDirectoryResponse { results: { user_id: string; display_name?: string; avatar_url?: string; }[]; limited: boolean; } export interface IMyDevice { device_id: string; display_name?: string; last_seen_ip?: string; last_seen_ts?: number; } export interface IDownloadKeyResult { failures: { [serverName: string]: object }; device_keys: { [userId: string]: { [deviceId: string]: IDeviceKeys & { unsigned?: { device_display_name: string; }; }; }; }; // the following three fields were added in 1.1 master_keys?: { [userId: string]: { keys: { [keyId: string]: string }; usage: string[]; user_id: string; }; }; self_signing_keys?: { [userId: string]: { keys: { [keyId: string]: string }; signatures: ISignatures; usage: string[]; user_id: string; }; }; user_signing_keys?: { [userId: string]: { keys: { [keyId: string]: string }; signatures: ISignatures; usage: string[]; user_id: string; }; }; } export interface IClaimOTKsResult { failures: { [serverName: string]: object }; one_time_keys: { [userId: string]: { [deviceId: string]: { [keyId: string]: { key: string; signatures: ISignatures; }; }; }; }; } export interface IFieldType { regexp: string; placeholder: string; } export interface IInstance { desc: string; icon?: string; fields: object; network_id: string; // XXX: this is undocumented but we rely on it: https://github.com/matrix-org/matrix-doc/issues/3203 instance_id: string; } export interface IProtocol { user_fields: string[]; location_fields: string[]; icon: string; field_types: Record<string, IFieldType>; instances: IInstance[]; } interface IThirdPartyLocation { alias: string; protocol: string; fields: object; } interface IThirdPartyUser { userid: string; protocol: string; fields: object; } interface IRoomSummary extends Omit<IPublicRoomsChunkRoom, "canonical_alias" | "aliases"> { room_type?: RoomType; membership?: string; is_encrypted: boolean; } interface IRoomKeysResponse { sessions: IKeyBackupRoomSessions; } interface IRoomsKeysResponse { rooms: Record<string, IRoomKeysResponse>; } interface IRoomHierarchy { rooms: IHierarchyRoom[]; next_batch?: string; } interface ITimestampToEventResponse { event_id: string; origin_server_ts: string; } /* eslint-enable camelcase */ // We're using this constant for methods overloading and inspect whether a variable // contains an eventId or not. This was required to ensure backwards compatibility // of methods for threads // Probably not the most graceful solution but does a good enough job for now const EVENT_ID_PREFIX = "$"; export enum ClientEvent { Sync = "sync", Event = "event", ToDeviceEvent = "toDeviceEvent", AccountData = "accountData", Room = "Room", DeleteRoom = "deleteRoom", SyncUnexpectedError = "sync.unexpectedError", ClientWellKnown = "WellKnown.client", } type RoomEvents = RoomEvent.Name | RoomEvent.Redaction | RoomEvent.RedactionCancelled | RoomEvent.Receipt | RoomEvent.Tags | RoomEvent.LocalEchoUpdated | RoomEvent.AccountData | RoomEvent.MyMembership | RoomEvent.Timeline | RoomEvent.TimelineReset; type RoomStateEvents = RoomStateEvent.Events | RoomStateEvent.Members | RoomStateEvent.NewMember | RoomStateEvent.Update ; type CryptoEvents = CryptoEvent.KeySignatureUploadFailure | CryptoEvent.KeyBackupStatus | CryptoEvent.KeyBackupFailed | CryptoEvent.KeyBackupSessionsRemaining | CryptoEvent.RoomKeyRequest | CryptoEvent.RoomKeyRequestCancellation | CryptoEvent.VerificationRequest | CryptoEvent.DeviceVerificationChanged | CryptoEvent.UserTrustStatusChanged | CryptoEvent.KeysChanged | CryptoEvent.Warning | CryptoEvent.DevicesUpdated | CryptoEvent.WillUpdateDevices; type MatrixEventEvents = MatrixEventEvent.Decrypted | MatrixEventEvent.Replaced | MatrixEventEvent.VisibilityChange; type RoomMemberEvents = RoomMemberEvent.Name | RoomMemberEvent.Typing | RoomMemberEvent.PowerLevel | RoomMemberEvent.Membership; type UserEvents = UserEvent.AvatarUrl | UserEvent.DisplayName | UserEvent.Presence | UserEvent.CurrentlyActive | UserEvent.LastPresenceTs; type EmittedEvents = ClientEvent | RoomEvents | RoomStateEvents | CryptoEvents | MatrixEventEvents | RoomMemberEvents | UserEvents | CallEvent // re-emitted by call.ts using Object.values | CallEventHandlerEvent.Incoming | HttpApiEvent.SessionLoggedOut | HttpApiEvent.NoConsent | BeaconEvent; export type ClientEventHandlerMap = { [ClientEvent.Sync]: (state: SyncState, lastState?: SyncState, data?: ISyncStateData) => void; [ClientEvent.Event]: (event: MatrixEvent) => void; [ClientEvent.ToDeviceEvent]: (event: MatrixEvent) => void; [ClientEvent.AccountData]: (event: MatrixEvent, lastEvent?: MatrixEvent) => void; [ClientEvent.Room]: (room: Room) => void; [ClientEvent.DeleteRoom]: (roomId: string) => void; [ClientEvent.SyncUnexpectedError]: (error: Error) => void; [ClientEvent.ClientWellKnown]: (data: IClientWellKnown) => void; } & RoomEventHandlerMap & RoomStateEventHandlerMap & CryptoEventHandlerMap & MatrixEventHandlerMap & RoomMemberEventHandlerMap & UserEventHandlerMap & CallEventHandlerEventHandlerMap & CallEventHandlerMap & HttpApiEventHandlerMap & BeaconEventHandlerMap; /** * Represents a Matrix Client. Only directly construct this if you want to use * custom modules. Normally, {@link createClient} should be used * as it specifies 'sensible' defaults for these modules. */ export class MatrixClient extends TypedEventEmitter<EmittedEvents, ClientEventHandlerMap> { public static readonly RESTORE_BACKUP_ERROR_BAD_KEY = 'RESTORE_BACKUP_ERROR_BAD_KEY'; public reEmitter = new TypedReEmitter<EmittedEvents, ClientEventHandlerMap>(this); public olmVersion: [number, number, number] = null; // populated after initCrypto public usingExternalCrypto = false; public store: Store; public deviceId?: string; public credentials: { userId?: string }; public pickleKey: string; public scheduler: MatrixScheduler; public clientRunning = false; public timelineSupport = false; public urlPreviewCache: { [key: string]: Promise<IPreviewUrlResponse> } = {}; public unstableClientRelationAggregation = false; public identityServer: IIdentityServerProvider; public sessionStore: SessionStore; // XXX: Intended private, used in code. public http: MatrixHttpApi; // XXX: Intended private, used in code. public crypto: Crypto; // XXX: Intended private, used in code. public cryptoCallbacks: ICryptoCallbacks; // XXX: Intended private, used in code. public callEventHandler: CallEventHandler; // XXX: Intended private, used in code. public supportsCallTransfer = false; // XXX: Intended private, used in code. public forceTURN = false; // XXX: Intended private, used in code. public iceCandidatePoolSize = 0; // XXX: Intended private, used in code. public idBaseUrl: string; public baseUrl: string; // Note: these are all `protected` to let downstream consumers make mistakes if they want to. // We don't technically support this usage, but have reasons to do this. protected canSupportVoip = false; protected peekSync: SyncApi = null; protected isGuestAccount = false; protected ongoingScrollbacks: {[roomId: string]: {promise?: Promise<Room>, errorTs?: number}} = {}; protected notifTimelineSet: EventTimelineSet = null; protected cryptoStore: CryptoStore; protected verificationMethods: VerificationMethod[]; protected fallbackICEServerAllowed = false; protected roomList: RoomList; protected syncApi: SyncApi; public pushRules: IPushRules; protected syncLeftRoomsPromise: Promise<Room[]>; protected syncedLeftRooms = false; protected clientOpts: IStoredClientOpts; protected clientWellKnownIntervalID: ReturnType<typeof setInterval>; protected canResetTimelineCallback: ResetTimelineCallback; // The pushprocessor caches useful things, so keep one and re-use it protected pushProcessor = new PushProcessor(this); // Promise to a response of the server's /versions response // TODO: This should expire: https://github.com/matrix-org/matrix-js-sdk/issues/1020 protected serverVersionsPromise: Promise<IServerVersions>; public cachedCapabilities: { capabilities: ICapabilities; expiration: number; }; protected clientWellKnown: IClientWellKnown; protected clientWellKnownPromise: Promise<IClientWellKnown>; protected turnServers: ITurnServer[] = []; protected turnServersExpiry = 0; protected checkTurnServersIntervalID: ReturnType<typeof setInterval>; protected exportedOlmDeviceToImport: IOlmDevice; protected txnCtr = 0; protected mediaHandler = new MediaHandler(this); protected pendingEventEncryption = new Map<string, Promise<void>>(); constructor(opts: IMatrixClientCreateOpts) { super(); opts.baseUrl = utils.ensureNoTrailingSlash(opts.baseUrl); opts.idBaseUrl = utils.ensureNoTrailingSlash(opts.idBaseUrl); this.baseUrl = opts.baseUrl; this.idBaseUrl = opts.idBaseUrl; this.usingExternalCrypto = opts.usingExternalCrypto; this.store = opts.store || new StubStore(); this.deviceId = opts.deviceId || null; const userId = opts.userId || null; this.credentials = { userId }; this.http = new MatrixHttpApi(this as ConstructorParameters<typeof MatrixHttpApi>[0], { baseUrl: opts.baseUrl, idBaseUrl: opts.idBaseUrl, accessToken: opts.accessToken, request: opts.request, prefix: PREFIX_R0, onlyData: true, extraParams: opts.queryParams, localTimeoutMs: opts.localTimeoutMs, useAuthorizationHeader: opts.useAuthorizationHeader, }); if (opts.deviceToImport) { if (this.deviceId) { logger.warn( 'not importing device because device ID is provided to ' + 'constructor independently of exported data', ); } else if (this.credentials.userId) { logger.warn( 'not importing device because user ID is provided to ' + 'constructor independently of exported data', ); } else if (!opts.deviceToImport.deviceId) { logger.warn('not importing device because no device ID in exported data'); } else { this.deviceId = opts.deviceToImport.deviceId; this.credentials.userId = opts.deviceToImport.userId; // will be used during async initialization of the crypto this.exportedOlmDeviceToImport = opts.deviceToImport.olmDevice; } } else if (opts.pickleKey) { this.pickleKey = opts.pickleKey; } this.scheduler = opts.scheduler; if (this.scheduler) { this.scheduler.setProcessFunction(async (eventToSend: MatrixEvent) => { const room = this.getRoom(eventToSend.getRoomId()); if (eventToSend.status !== EventStatus.SENDING) { this.updatePendingEventStatus(room, eventToSend, EventStatus.SENDING); } const res = await this.sendEventHttpRequest(eventToSend); if (room) { // ensure we update pending event before the next scheduler run so that any listeners to event id // updates on the synchronous event emitter get a chance to run first. room.updatePendingEvent(eventToSend, EventStatus.SENT, res.event_id); } return res; }); } if (supportsMatrixCall()) { this.callEventHandler = new CallEventHandler(this); this.canSupportVoip = true; // Start listening for calls after the initial sync is done // We do not need to backfill the call event buffer // with encrypted events that might never get decrypted this.on(ClientEvent.Sync, this.startCallEventHandler); } this.timelineSupport = Boolean(opts.timelineSupport); this.unstableClientRelationAggregation = !!opts.unstableClientRelationAggregation; this.cryptoStore = opts.cryptoStore; this.sessionStore = opts.sessionStore; this.verificationMethods = opts.verificationMethods; this.cryptoCallbacks = opts.cryptoCallbacks || {}; this.forceTURN = opts.forceTURN || false; this.iceCandidatePoolSize = opts.iceCandidatePoolSize === undefined ? 0 : opts.iceCandidatePoolSize; this.supportsCallTransfer = opts.supportsCallTransfer || false; this.fallbackICEServerAllowed = opts.fallbackICEServerAllowed || false; // List of which rooms have encryption enabled: separate from crypto because // we still want to know which rooms are encrypted even if crypto is disabled: // we don't want to start sending unencrypted events to them. this.roomList = new RoomList(this.cryptoStore); // The SDK doesn't really provide a clean way for events to recalculate the push // actions for themselves, so we have to kinda help them out when they are encrypted. // We do this so that push rules are correctly executed on events in their decrypted // state, such as highlights when the user's name is mentioned. this.on(MatrixEventEvent.Decrypted, (event) => { const oldActions = event.getPushActions(); const actions = this.getPushActionsForEvent(event, true); const room = this.getRoom(event.getRoomId()); if (!room) return; const currentCount = room.getUnreadNotificationCount(NotificationCountType.Highlight); // Ensure the unread counts are kept up to date if the event is encrypted // We also want to make sure that the notification count goes up if we already // have encrypted events to avoid other code from resetting 'highlight' to zero. const oldHighlight = !!oldActions?.tweaks?.highlight; const newHighlight = !!actions?.tweaks?.highlight; if (oldHighlight !== newHighlight || currentCount > 0) { // TODO: Handle mentions received while the client is offline // See also https://github.com/vector-im/element-web/issues/9069 if (!room.hasUserReadEvent(this.getUserId(), event.getId())) { let newCount = currentCount; if (newHighlight && !oldHighlight) newCount++; if (!newHighlight && oldHighlight) newCount--; room.setUnreadNotificationCount(NotificationCountType.Highlight, newCount); // Fix 'Mentions Only' rooms from not having the right badge count const totalCount = room.getUnreadNotificationCount(NotificationCountType.Total); if (totalCount < newCount) { room.setUnreadNotificationCount(NotificationCountType.Total, newCount); } } } }); // Like above, we have to listen for read receipts from ourselves in order to // correctly handle notification counts on encrypted rooms. // This fixes https://github.com/vector-im/element-web/issues/9421 this.on(RoomEvent.Receipt, (event, room) => { if (room && this.isRoomEncrypted(room.roomId)) { // Figure out if we've read something or if it's just informational const content = event.getContent(); const isSelf = Object.keys(content).filter(eid => { const read = content[eid][ReceiptType.Read]; if (read && Object.keys(read).includes(this.getUserId())) return true; const readPrivate = content[eid][ReceiptType.ReadPrivate]; if (readPrivate && Object.keys(readPrivate).includes(this.getUserId())) return true; return false; }).length > 0; if (!isSelf) return; // Work backwards to determine how many events are unread. We also set // a limit for how back we'll look to avoid spinning CPU for too long. // If we hit the limit, we assume the count is unchanged. const maxHistory = 20; const events = room.getLiveTimeline().getEvents(); let highlightCount = 0; for (let i = events.length - 1; i >= 0; i--) { if (i === events.length - maxHistory) return; // limit reached const event = events[i]; if (room.hasUserReadEvent(this.getUserId(), event.getId())) { // If the user has read the event, then the counting is done. break; } const pushActions = this.getPushActionsForEvent(event); highlightCount += pushActions.tweaks && pushActions.tweaks.highlight ? 1 : 0; } // Note: we don't need to handle 'total' notifications because the counts // will come from the server. room.setUnreadNotificationCount(NotificationCountType.Highlight, highlightCount); } }); } /** * High level helper method to begin syncing and poll for new events. To listen for these * events, add a listener for {@link module:client~MatrixClient#event:"event"} * via {@link module:client~MatrixClient#on}. Alternatively, listen for specific * state change events. * @param {Object=} opts Options to apply when syncing. */ public async startClient(opts?: IStartClientOpts): Promise<void> { if (this.clientRunning) { // client is already running. return; } this.clientRunning = true; // backwards compat for when 'opts' was 'historyLen'. if (typeof opts === "number") { opts = { initialSyncLimit: opts, }; } // Create our own user object artificially (instead of waiting for sync) // so it's always available, even if the user is not in any rooms etc. const userId = this.getUserId(); if (userId) { this.store.storeUser(new User(userId)); } if (this.crypto) { this.crypto.uploadDeviceKeys(); this.crypto.start(); } // periodically poll for turn servers if we support voip if (this.canSupportVoip) { this.checkTurnServersIntervalID = setInterval(() => { this.checkTurnServers(); }, TURN_CHECK_INTERVAL); // noinspection ES6MissingAwait this.checkTurnServers(); } if (this.syncApi) { // This shouldn't happen since we thought the client was not running logger.error("Still have sync object whilst not running: stopping old one"); this.syncApi.stop(); } try { const { serverSupport, stable } = await this.doesServerSupportThread(); Thread.setServerSideSupport(serverSupport, stable); } catch (e) { // Most likely cause is that `doesServerSupportThread` returned `null` (as it // is allowed to do) and thus we enter "degraded mode" on threads. Thread.setServerSideSupport(false, true); } // shallow-copy the opts dict before modifying and storing it this.clientOpts = Object.assign({}, opts) as IStoredClientOpts; this.clientOpts.crypto = this.crypto; this.clientOpts.canResetEntireTimeline = (roomId) => { if (!this.canResetTimelineCallback) { return false; } return this.canResetTimelineCallback(roomId); }; this.syncApi = new SyncApi(this, this.clientOpts); this.syncApi.sync(); if (this.clientOpts.clientWellKnownPollPeriod !== undefined) { this.clientWellKnownIntervalID = setInterval(() => { this.fetchClientWellKnown(); }, 1000 * this.clientOpts.clientWellKnownPollPeriod); this.fetchClientWellKnown(); } } /** * High level helper method to stop the client from polling and allow a * clean shutdown. */ public stopClient() { this.crypto?.stop(); // crypto might have been initialised even if the client wasn't fully started if (!this.clientRunning) return; // already stopped logger.log('stopping MatrixClient'); this.clientRunning = false; this.syncApi?.stop(); this.syncApi = null; this.peekSync?.stopPeeking(); this.callEventHandler?.stop(); this.callEventHandler = null; global.clearInterval(this.checkTurnServersIntervalID); if (this.clientWellKnownIntervalID !== undefined) { global.clearInterval(this.clientWellKnownIntervalID); } } /** * Try to rehydrate a device if available. The client must have been * initialized with a `cryptoCallback.getDehydrationKey` option, and this * function must be called before initCrypto and startClient are called. * * @return {Promise<string>} Resolves to undefined if a device could not be dehydrated, or * to the new device ID if the dehydration was successful. * @return {module:http-api.MatrixError} Rejects: with an error response. */ public async rehydrateDevice(): Promise<string> { if (this.crypto) { throw new Error("Cannot rehydrate device after crypto is initialized"); } if (!this.cryptoCallbacks.getDehydrationKey) { return; } const getDeviceResult = await this.getDehydratedDevice(); if (!getDeviceResult) { return; } if (!getDeviceResult.device_data || !getDeviceResult.device_id) { logger.info("no dehydrated device found"); return; } const account = new global.Olm.Account(); try { const deviceData = getDeviceResult.device_data; if (deviceData.algorithm !== DEHYDRATION_ALGORITHM) { logger.warn("Wrong algorithm for dehydrated device"); return; } logger.log("unpickling dehydrated device"); const key = await this.cryptoCallbacks.getDehydrationKey( deviceData, (k) => { // copy the key so that it doesn't get clobbered account.unpickle(new Uint8Array(k), deviceData.account); }, ); account.unpickle(key, deviceData.account); logger.log("unpickled device"); const rehydrateResult = await this.http.authedRequest<{ success: boolean }>( undefined, Method.Post, "/dehydrated_device/claim", undefined, { device_id: getDeviceResult.device_id, }, { prefix: "/_matrix/client/unstable/org.matrix.msc2697.v2", }, ); if (rehydrateResult.success === true) { this.deviceId = getDeviceResult.device_id; logger.info("using dehydrated device"); const pickleKey = this.pickleKey || "DEFAULT_KEY"; this.exportedOlmDeviceToImport = { pickledAccount: account.pickle(pickleKey), sessions: [], pickleKey: pickleKey, }; account.free(); return this.deviceId; } else { account.free(); logger.info("not using dehydrated device"); return; } } catch (e) { account.free(); logger.warn("could not unpickle", e); } } /** * Get the current dehydrated device, if any * @return {Promise} A promise of an object containing the dehydrated device */ public async getDehydratedDevice(): Promise<IDehydratedDevice> { try { return await this.http.authedRequest<IDehydratedDevice>( undefined, Method.Get, "/dehydrated_device", undefined, undefined, { prefix: "/_matrix/client/unstable/org.matrix.msc2697.v2", }, ); } catch (e) { logger.info("could not get dehydrated device", e.toString()); return; } } /** * Set the dehydration key. This will also periodically dehydrate devices to * the server. * * @param {Uint8Array} key the dehydration key * @param {IDehydratedDeviceKeyInfo} [keyInfo] Information about the key. Primarily for * information about how to generate the key from a passphrase. * @param {string} [deviceDisplayName] The device display name for the * dehydrated device. * @return {Promise} A promise that resolves when the dehydrated device is stored. */ public setDehydrationKey( key: Uint8Array, keyInfo: IDehydratedDeviceKeyInfo, deviceDisplayName?: string, ): Promise<void> { if (!this.crypto) { logger.warn('not dehydrating device if crypto is not enabled'); return; } return this.crypto.dehydrationManager.setKeyAndQueueDehydration(key, keyInfo, deviceDisplayName); } /** * Creates a new dehydrated device (without queuing periodic dehydration) * @param {Uint8Array} key the dehydration key * @param {IDehydratedDeviceKeyInfo} [keyInfo] Information about the key. Primarily for * information about how to generate the key from a passphrase. * @param {string} [deviceDisplayName] The device display name for the * dehydrated device. * @return {Promise<String>} the device id of the newly created dehydrated device */ public async createDehydratedDevice( key: Uint8Array, keyInfo: IDehydratedDeviceKeyInfo, deviceDisplayName?: string, ): Promise<string> { if (!this.crypto) { logger.warn('not dehydrating device if crypto is not enabled'); return; } await this.crypto.dehydrationManager.setKey(key, keyInfo, deviceDisplayName); return this.crypto.dehydrationManager.dehydrateDevice(); } public async exportDevice(): Promise<IExportedDevice> { if (!this.crypto) { logger.warn('not exporting device if crypto is not enabled'); return; } return { userId: this.credentials.userId, deviceId: this.deviceId, // XXX: Private member access. olmDevice: await this.crypto.olmDevice.export(), }; } /** * Clear any data out of the persistent stores used by the client. * * @returns {Promise} Promise which resolves when the stores have been cleared. */ public clearStores(): Promise<void> { if (this.clientRunning) { throw new Error("Cannot clear stores while client is running"); } const promises = []; promises.push(this.store.deleteAllData()); if (this.cryptoStore) { promises.push(this.cryptoStore.deleteAllData()); } return Promise.all(promises).then(); // .then to fix types } /** * Get the user-id of the logged-in user * * @return {?string} MXID for the logged-in user, or null if not logged in */ public getUserId(): string { if (this.credentials && this.credentials.userId) { return this.credentials.userId; } return null; } /** * Get the domain for this client's MXID * @return {?string} Domain of this MXID */ public getDomain(): string { if (this.credentials && this.credentials.userId) { return this.credentials.userId.replace(/^.*?:/, ''); } return null; } /** * Get the local part of the current user ID e.g. "foo" in "@foo:bar". * @return {?string} The user ID localpart or null. */ public getUserIdLocalpart(): string { if (this.credentials && this.credentials.userId) { return this.credentials.userId.split(":")[0].substring(1); } return null; } /** * Get the device ID of this client * @return {?string} device ID */ public getDeviceId(): string { return this.deviceId; } /** * Check if the runtime environment supports VoIP calling. * @return {boolean} True if VoIP is supported. */ public supportsVoip(): boolean { return this.canSupportVoip; } /** * @returns {MediaHandler} */ public getMediaHandler(): MediaHandler { return this.mediaHandler; } /** * Set whether VoIP calls are forced to use only TURN * candidates. This