Travis Ralston
e7c764d5f5
Add debugging for spurious room version warnings
...
See https://github.com/vector-im/riot-web/issues/9225
2019-03-20 17:05:09 -06:00
Matthew Hodgson
77270fa78c
Merge pull request #851 from matrix-org/travis/e2e-notifs
...
Calculate encrypted notification counts
2019-03-06 17:11:22 +00:00
Travis Ralston
6198943976
Add a mention that we should be handling gaps in /sync
2019-03-06 09:56:36 -07:00
Travis Ralston
37f106d4af
More safely set the push actions for an encrypted event
2019-03-05 14:04:39 -07:00
Travis Ralston
829cd05cba
Appease the linter
2019-03-04 21:46:48 -07:00
Travis Ralston
4834e12a3a
Calculate unread badges for encrypted events
2019-03-04 21:41:20 -07:00
Travis Ralston
998d9e010e
Support flushing the cache on calculated push rules
...
Needed for encrypted events to be able to pass some push rules.
2019-03-04 21:24:25 -07:00
Hubert Chathi
5480e8e1d5
refactor key sharing requests
...
use sendRoomKeyRequest with a new resend flag, instead of cancelRoomKeyRequest,
when requesting keys, so that we make sure that we send a new request if there
is no previous request
fixes https://github.com/vector-im/riot-web/issues/6838
2019-03-04 17:09:56 -05:00
David Baker
a087fb37a3
Add method to force re-check of key backup
...
Also detect when the key backup version changes and do the right
thing
https://github.com/vector-im/riot-web/issues/8524
2019-02-13 15:40:07 +00:00
David Baker
dade385147
Put error constant on the class
2019-02-08 10:43:17 +00:00
David Baker
5e4f10a80c
Trust on decrypt
...
Trust backups that we've restored by saving the matching pubkey
locally.
NB. Contains technically breaking API changes to the backup restore
(takes backupInfo rather than version).
2019-02-07 14:37:25 +00:00
Travis Ralston
2d4e9d0d3f
Add safety for when the endpoint doesn't exist
2019-01-28 17:18:57 -07:00
Travis Ralston
971d572fbf
Supporting infrastructure for educated decisions on when to upgrade rooms
...
Part of https://github.com/vector-im/riot-web/issues/8251
2019-01-28 16:03:27 -07:00
Hubert Chathi
244e1b84f7
Initial implementation of key verification
2019-01-23 13:34:25 -05:00
J. Ryan Stinnett
2563abda11
Ensure we have power to set custom status
...
If we're in a non-DM room of 2 people, we may not have power to set state events
like custom status. Ensure that we do before sending.
2019-01-15 08:59:31 -06:00
J. Ryan Stinnett
25681e888c
Change initial key backup to background
...
Alters the APIs used for initial key backup so that the actual upload happens in
the background after all session are marked for backup.
2019-01-09 12:03:55 -06:00
J. Ryan Stinnett
5cfd082b00
Schedule key upload on enabling backup
...
This ensures a partially completed backup will continue to make progress.
2019-01-09 12:03:55 -06:00
J. Ryan Stinnett
0cbced43bd
Emit when count of sessions to backup changes
...
This will be used in the React SDK to display upload progress when there are
many sessions to upload.
2019-01-09 12:03:55 -06:00
J. Ryan Stinnett
2b734b8e69
Emit for key backup failures
...
Signed-off-by: J. Ryan Stinnett <jryans@gmail.com >
2018-12-14 15:17:22 +00:00
Travis Ralston
08b3dfa3b5
Prefix the status message API with _unstable
...
It's not a formal feature of Matrix yet, so we should try and avoid people relying on it. This makes it appear as a private API and is very clearly labeled as not intended for use.
2018-12-12 23:05:03 -07:00
Travis Ralston
fb65c7f4ba
Support setting status message in rooms that look like 1:1s
...
Part of https://github.com/vector-im/riot-web/issues/1528
2018-12-12 13:21:13 -07:00
Travis Ralston
c619e5c381
Merge pull request #798 from matrix-org/hs/fix-media-config
...
Config should be called with auth
2018-12-03 18:29:56 -07:00
Will Hunt
e7c4a74ed6
Config should be called with auth
2018-12-04 01:27:08 +00:00
David Baker
092f4217b0
docs
2018-11-21 17:56:02 +00:00
David Baker
eeea70640e
Add randomString factored out from client secret
2018-11-20 16:28:29 +00:00
David Baker
6047838f53
lint
2018-11-20 16:17:58 +00:00
David Baker
cb51799246
Make backup restore work
2018-11-20 16:15:29 +00:00
David Baker
44d99277fe
Support passphrase-based e2e key backups
2018-11-20 13:09:59 +00:00
David Baker
907cf19f05
Merge remote-tracking branch 'origin/develop' into dbkr/e2e_backups
2018-11-15 16:35:52 +00:00
Travis Ralston
c9a79bf32e
Prevent messages from being sent if other messages have failed to send
...
Fixes https://github.com/vector-im/riot-web/issues/5408
2018-11-08 16:46:03 -07:00
David Baker
c5e7bedb37
Conclusion: no, it shouldn't
2018-10-31 18:08:53 +00:00
David Baker
2b46c560c7
Add crypto. prefix to keyBackupStatus event
2018-10-31 18:07:12 +00:00
David Baker
e51d2dd36a
Fix a few e2e backup bits
...
* Don't _maybeSendKeyBackup() as soon as we enable them: we shouldn't
have anything to send anyway until we mark all sessions for backup,
which we do just afterwards, so leave that to trigger the upload
(otherwise the uploading triggered by backupAll just returns
straight away because a backup is already in progress).
* Pass delay & retry params to _maybeSendKeyBackup(): we want the
all-key upload to happen straight away so pass in delay=0, and
we also don't want to retry on a timer if the the user is waiting.
* If we fail due to an HTTP 400 or similar, don't swallow the error.
* Use the right indexeddb store
2018-10-30 11:45:19 +00:00
Travis Ralston
1bd44a7427
Merge remote-tracking branch 'origin/develop' into travis/permalink-routing
2018-10-25 14:36:46 -06:00
Travis Ralston
568ff5a3f5
Appease the linter
2018-10-25 14:36:14 -06:00
David Baker
4b9c6e6bd2
Merge remote-tracking branch 'origin/develop' into dbkr/wasm
2018-10-24 19:15:04 +01:00
David Baker
f165b55a1d
Merge branch 'e2e_backups' of git://github.com/uhoreg/matrix-js-sdk into uhoreg-e2e_backups
2018-10-24 17:15:36 +01:00
Travis Ralston
d8bcc4e3f1
Initial support for specifying which servers to try in joinRoom
...
This has a bug when using browser-request where the query string for `server_name: [a, b]` comes out as `?server_name=a,b` instead of `?server_name=a&server_name=b`. This is due to browser-request not supporting the same qs options as request, so the qsStringifyOptions do nothing.
2018-10-19 13:34:22 -06:00
Will Hunt
e638c49160
Merge remote-tracking branch 'upstream/develop' into hs/upload-limits
2018-10-16 11:32:21 +01:00
Hubert Chathi
3957006fae
Merge remote-tracking branch 'upstream/dbkr/e2e_backups' into e2e_backups
2018-10-11 14:01:26 -04:00
David Baker
30362091e5
Don't fail to start up if lazy load check fails
...
Do the lazy loading check in the batch of things we do before
starting a sync rather than at client start time, so we don't fail
to start the client if we can't hit the HS to determine LL support.
Fixes https://github.com/vector-im/riot-web/issues/7455
2018-10-10 16:59:36 +01:00
David Baker
ada4b6ef16
Lint
2018-10-09 15:46:12 +01:00
David Baker
5873db7331
Merge remote-tracking branch 'origin/develop' into dbkr/wasm
2018-10-09 10:47:11 +01:00
David Baker
89c3f6fa0e
Merge remote-tracking branch 'origin/develop' into dbkr/e2e_backups
2018-10-05 14:01:43 +01:00
David Baker
264b20535e
Silence bluebird warnings
2018-10-05 12:13:05 +01:00
Hubert Chathi
258adda67c
retry key backups when they fail
2018-10-04 15:19:20 -04:00
David Baker
9504cbcc4f
Merge remote-tracking branch 'origin/develop' into dbkr/wasm
2018-10-04 11:19:37 +01:00
David Baker
7cd101d8cb
Fix recovery key format
2018-10-02 19:22:10 +01:00
David Baker
ce2058aea9
Merge branch 'dbkr/wasm' into dbkr/e2e_backups
2018-10-02 16:54:36 +01:00
David Baker
e9b0acaa8e
Merge remote-tracking branch 'origin/develop' into dbkr/e2e_backups
2018-10-02 16:50:37 +01:00