UNPKG

matrix-js-sdk

Version:
232 lines (199 loc) 7.44 kB
/* Copyright 2024 The Matrix.org Foundation C.I.C. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ /** * This file is a secondary entrypoint for the js-sdk library, exposing utilities which might be useful for writing tests. * * In general, it should not be included in runtime applications. * * @packageDocumentation */ import { type IContent, type IEvent, type IUnsigned, MatrixEvent } from "./models/event.ts"; import { type RoomMember } from "./models/room-member.ts"; import { EventType } from "./@types/event.ts"; import { type DecryptionFailureCode } from "./crypto-api/index.ts"; import { DecryptionError, type EventDecryptionResult } from "./common-crypto/CryptoBackend.ts"; import { OAuthGrantType, type OidcClientConfig, type ValidatedAuthMetadata } from "./oidc/index.ts"; /** * Create a {@link MatrixEvent}. * * @param opts - Values for the event. */ export function mkMatrixEvent(opts: { /** Room ID of the event. */ roomId: string; /** The sender of the event. */ sender: string; /** The type of the event. */ type: EventType | string; /** Optional `state_key` for the event. If unspecified, a non-state event is created. */ stateKey?: string; /** Optional `origin_server_ts` for the event. If unspecified, the timestamp will be set to 0. */ ts?: number; /** Optional `event_id` for the event. If provided will be used as event ID; else an ID is generated. */ eventId?: string; /** Content of the event. */ content: IContent; /** Optional `unsigned` data for the event. */ unsigned?: IUnsigned; }): MatrixEvent { const event: Partial<IEvent> = { type: opts.type, room_id: opts.roomId, sender: opts.sender, content: opts.content, event_id: opts.eventId ?? "$" + Math.random() + "-" + Math.random(), origin_server_ts: opts.ts ?? 0, unsigned: opts.unsigned, }; if (opts.stateKey !== undefined) { event.state_key = opts.stateKey; } const mxEvent = new MatrixEvent(event); mxEvent.sender = { userId: opts.sender, membership: "join", name: opts.sender, rawDisplayName: opts.sender, roomId: opts.sender, getAvatarUrl: () => {}, getMxcAvatarUrl: () => {}, } as unknown as RoomMember; return mxEvent; } /** * Create a `MatrixEvent` representing a successfully-decrypted `m.room.encrypted` event. * * @param opts - Values for the event. */ export async function mkEncryptedMatrixEvent(opts: { /** Room ID of the event. */ roomId: string; /** The sender of the event. */ sender: string; /** The type the event will have, once it has been decrypted. */ plainType: EventType | string; /** The content the event will have, once it has been decrypted. */ plainContent: IContent; /** Optional `event_id` for the event. If provided will be used as event ID; else an ID is generated. */ eventId?: string; }): Promise<MatrixEvent> { const mxEvent = mkMatrixEvent({ type: EventType.RoomMessageEncrypted, roomId: opts.roomId, sender: opts.sender, content: { algorithm: "m.megolm.v1.aes-sha2" }, eventId: opts.eventId, }); await decryptExistingEvent(mxEvent, { plainType: opts.plainType, plainContent: opts.plainContent }); return mxEvent; } /** * Create a `MatrixEvent` representing a `m.room.encrypted` event which could not be decrypted. * * @param opts - Values for the event. */ export async function mkDecryptionFailureMatrixEvent(opts: { /** Room ID of the event. */ roomId: string; /** The sender of the event. */ sender: string; /** The reason code for the failure */ code: DecryptionFailureCode; /** A textual reason for the failure */ msg: string; /** Optional `event_id` for the event. If provided will be used as event ID; else an ID is generated. */ eventId?: string; }): Promise<MatrixEvent> { const mxEvent = mkMatrixEvent({ type: EventType.RoomMessageEncrypted, roomId: opts.roomId, sender: opts.sender, content: { algorithm: "m.megolm.v1.aes-sha2" }, eventId: opts.eventId, }); const mockCrypto = { decryptEvent: async (_ev): Promise<EventDecryptionResult> => { throw new DecryptionError(opts.code, opts.msg); }, } as Parameters<MatrixEvent["attemptDecryption"]>[0]; await mxEvent.attemptDecryption(mockCrypto); return mxEvent; } /** * Given an event previously returned by {@link mkDecryptionFailureMatrixEvent}, simulate a successful re-decryption * attempt. * * @param mxEvent - The event that will be decrypted. * @param opts - New data for the successful decryption. */ export async function decryptExistingEvent( mxEvent: MatrixEvent, opts: { /** The type the event will have, once it has been decrypted. */ plainType: EventType | string; /** The content the event will have, once it has been decrypted. */ plainContent: IContent; }, ): Promise<void> { const decryptionResult: EventDecryptionResult = { claimedEd25519Key: "", clearEvent: { type: opts.plainType, content: opts.plainContent, }, senderCurve25519Key: "", }; const mockCrypto = { decryptEvent: async (_ev): Promise<EventDecryptionResult> => decryptionResult, } as Parameters<MatrixEvent["attemptDecryption"]>[0]; await mxEvent.attemptDecryption(mockCrypto); } /** * Makes a valid OidcClientConfig with minimum valid values * @param issuer used as the base for all other urls * @param additionalGrantTypes to add to the default grant types * @returns OidcClientConfig * @experimental */ export const makeDelegatedAuthConfig = ( issuer = "https://auth.org/", additionalGrantTypes: string[] = [], ): OidcClientConfig => { const metadata = mockOpenIdConfiguration(issuer, additionalGrantTypes); return { ...metadata, signingKeys: null, }; }; /** * Useful for mocking <issuer>/.well-known/openid-configuration * @param issuer used as the base for all other urls * @param additionalGrantTypes to add to the default grant types * @returns ValidatedAuthMetadata * @experimental */ export const mockOpenIdConfiguration = ( issuer = "https://auth.org/", additionalGrantTypes: string[] = [], ): ValidatedAuthMetadata => ({ issuer, revocation_endpoint: issuer + "revoke", token_endpoint: issuer + "token", authorization_endpoint: issuer + "auth", registration_endpoint: issuer + "registration", device_authorization_endpoint: issuer + "device", jwks_uri: issuer + "jwks", response_types_supported: ["code"], grant_types_supported: [OAuthGrantType.AuthorizationCode, OAuthGrantType.RefreshToken, ...additionalGrantTypes], code_challenge_methods_supported: ["S256"], });