You've already forked matrix-js-sdk
mirror of
https://github.com/matrix-org/matrix-js-sdk.git
synced 2025-11-23 17:02:25 +03:00
1597 lines
56 KiB
TypeScript
1597 lines
56 KiB
TypeScript
/*
|
|
Copyright 2015 - 2022 The Matrix.org Foundation C.I.C.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
/**
|
|
* This is an internal module. See {@link MatrixEvent} and {@link RoomEvent} for
|
|
* the public classes.
|
|
* @module models/event
|
|
*/
|
|
|
|
import { ExtensibleEvent, ExtensibleEvents, Optional } from "matrix-events-sdk";
|
|
|
|
import { logger } from '../logger';
|
|
import { VerificationRequest } from "../crypto/verification/request/VerificationRequest";
|
|
import { EVENT_VISIBILITY_CHANGE_TYPE, EventType, MsgType, RelationType } from "../@types/event";
|
|
import { Crypto, IEventDecryptionResult } from "../crypto";
|
|
import { deepSortedObjectEntries, internaliseString } from "../utils";
|
|
import { RoomMember } from "./room-member";
|
|
import { Thread, ThreadEvent, EventHandlerMap as ThreadEventHandlerMap, THREAD_RELATION_TYPE } from "./thread";
|
|
import { IActionsObject } from '../pushprocessor';
|
|
import { TypedReEmitter } from '../ReEmitter';
|
|
import { MatrixError } from "../http-api";
|
|
import { TypedEventEmitter } from "./typed-event-emitter";
|
|
import { EventStatus } from "./event-status";
|
|
|
|
export { EventStatus } from "./event-status";
|
|
|
|
/* eslint-disable camelcase */
|
|
export interface IContent {
|
|
[key: string]: any;
|
|
msgtype?: MsgType | string;
|
|
membership?: string;
|
|
avatar_url?: string;
|
|
displayname?: string;
|
|
"m.relates_to"?: IEventRelation;
|
|
}
|
|
|
|
type StrippedState = Required<Pick<IEvent, "content" | "state_key" | "type" | "sender">>;
|
|
|
|
export interface IUnsigned {
|
|
age?: number;
|
|
prev_sender?: string;
|
|
prev_content?: IContent;
|
|
redacted_because?: IEvent;
|
|
transaction_id?: string;
|
|
invite_room_state?: StrippedState[];
|
|
"m.relations"?: Record<RelationType | string, any>; // No common pattern for aggregated relations
|
|
}
|
|
|
|
export interface IThreadBundledRelationship {
|
|
latest_event: IEvent;
|
|
count: number;
|
|
current_user_participated?: boolean;
|
|
}
|
|
|
|
export interface IEvent {
|
|
event_id: string;
|
|
type: string;
|
|
content: IContent;
|
|
sender: string;
|
|
room_id: string;
|
|
origin_server_ts: number;
|
|
txn_id?: string;
|
|
state_key?: string;
|
|
membership?: string;
|
|
unsigned: IUnsigned;
|
|
redacts?: string;
|
|
|
|
/**
|
|
* @deprecated
|
|
*/
|
|
user_id?: string;
|
|
/**
|
|
* @deprecated
|
|
*/
|
|
prev_content?: IContent;
|
|
/**
|
|
* @deprecated
|
|
*/
|
|
age?: number;
|
|
}
|
|
|
|
export interface IAggregatedRelation {
|
|
origin_server_ts: number;
|
|
event_id?: string;
|
|
sender?: string;
|
|
type?: string;
|
|
count?: number;
|
|
key?: string;
|
|
}
|
|
|
|
export interface IEventRelation {
|
|
rel_type?: RelationType | string;
|
|
event_id?: string;
|
|
is_falling_back?: boolean;
|
|
"m.in_reply_to"?: {
|
|
event_id: string;
|
|
};
|
|
key?: string;
|
|
}
|
|
|
|
/**
|
|
* When an event is a visibility change event, as per MSC3531,
|
|
* the visibility change implied by the event.
|
|
*/
|
|
export interface IVisibilityChange {
|
|
/**
|
|
* If `true`, the target event should be made visible.
|
|
* Otherwise, it should be hidden.
|
|
*/
|
|
visible: boolean;
|
|
|
|
/**
|
|
* The event id affected.
|
|
*/
|
|
eventId: string;
|
|
|
|
/**
|
|
* Optionally, a human-readable reason explaining why
|
|
* the event was hidden. Ignored if the event was made
|
|
* visible.
|
|
*/
|
|
reason: string | null;
|
|
}
|
|
|
|
export interface IClearEvent {
|
|
room_id?: string;
|
|
type: string;
|
|
content: Omit<IContent, "membership" | "avatar_url" | "displayname" | "m.relates_to">;
|
|
unsigned?: IUnsigned;
|
|
}
|
|
/* eslint-enable camelcase */
|
|
|
|
interface IKeyRequestRecipient {
|
|
userId: string;
|
|
deviceId: "*" | string;
|
|
}
|
|
|
|
export interface IDecryptOptions {
|
|
emit?: boolean;
|
|
isRetry?: boolean;
|
|
}
|
|
|
|
/**
|
|
* Message hiding, as specified by https://github.com/matrix-org/matrix-doc/pull/3531.
|
|
*/
|
|
export type MessageVisibility = IMessageVisibilityHidden | IMessageVisibilityVisible;
|
|
/**
|
|
* Variant of `MessageVisibility` for the case in which the message should be displayed.
|
|
*/
|
|
export interface IMessageVisibilityVisible {
|
|
readonly visible: true;
|
|
}
|
|
/**
|
|
* Variant of `MessageVisibility` for the case in which the message should be hidden.
|
|
*/
|
|
export interface IMessageVisibilityHidden {
|
|
readonly visible: false;
|
|
/**
|
|
* Optionally, a human-readable reason to show to the user indicating why the
|
|
* message has been hidden (e.g. "Message Pending Moderation").
|
|
*/
|
|
readonly reason: string | null;
|
|
}
|
|
// A singleton implementing `IMessageVisibilityVisible`.
|
|
const MESSAGE_VISIBLE: IMessageVisibilityVisible = Object.freeze({ visible: true });
|
|
|
|
export enum MatrixEventEvent {
|
|
Decrypted = "Event.decrypted",
|
|
BeforeRedaction = "Event.beforeRedaction",
|
|
VisibilityChange = "Event.visibilityChange",
|
|
LocalEventIdReplaced = "Event.localEventIdReplaced",
|
|
Status = "Event.status",
|
|
Replaced = "Event.replaced",
|
|
RelationsCreated = "Event.relationsCreated",
|
|
}
|
|
|
|
type EmittedEvents = MatrixEventEvent | ThreadEvent.Update;
|
|
|
|
export type MatrixEventHandlerMap = {
|
|
[MatrixEventEvent.Decrypted]: (event: MatrixEvent, err?: Error) => void;
|
|
[MatrixEventEvent.BeforeRedaction]: (event: MatrixEvent, redactionEvent: MatrixEvent) => void;
|
|
[MatrixEventEvent.VisibilityChange]: (event: MatrixEvent, visible: boolean) => void;
|
|
[MatrixEventEvent.LocalEventIdReplaced]: (event: MatrixEvent) => void;
|
|
[MatrixEventEvent.Status]: (event: MatrixEvent, status: EventStatus) => void;
|
|
[MatrixEventEvent.Replaced]: (event: MatrixEvent) => void;
|
|
[MatrixEventEvent.RelationsCreated]: (relationType: string, eventType: string) => void;
|
|
} & ThreadEventHandlerMap;
|
|
|
|
export class MatrixEvent extends TypedEventEmitter<EmittedEvents, MatrixEventHandlerMap> {
|
|
private pushActions: IActionsObject = null;
|
|
private _replacingEvent: MatrixEvent = null;
|
|
private _localRedactionEvent: MatrixEvent = null;
|
|
private _isCancelled = false;
|
|
private clearEvent?: IClearEvent;
|
|
|
|
/* Message hiding, as specified by https://github.com/matrix-org/matrix-doc/pull/3531.
|
|
|
|
Note: We're returning this object, so any value stored here MUST be frozen.
|
|
*/
|
|
private visibility: MessageVisibility = MESSAGE_VISIBLE;
|
|
|
|
// Not all events will be extensible-event compatible, so cache a flag in
|
|
// addition to a falsy cached event value. We check the flag later on in
|
|
// a public getter to decide if the cache is valid.
|
|
private _hasCachedExtEv = false;
|
|
private _cachedExtEv: Optional<ExtensibleEvent> = undefined;
|
|
|
|
/* curve25519 key which we believe belongs to the sender of the event. See
|
|
* getSenderKey()
|
|
*/
|
|
private senderCurve25519Key: string = null;
|
|
|
|
/* ed25519 key which the sender of this event (for olm) or the creator of
|
|
* the megolm session (for megolm) claims to own. See getClaimedEd25519Key()
|
|
*/
|
|
private claimedEd25519Key: string = null;
|
|
|
|
/* curve25519 keys of devices involved in telling us about the
|
|
* senderCurve25519Key and claimedEd25519Key.
|
|
* See getForwardingCurve25519KeyChain().
|
|
*/
|
|
private forwardingCurve25519KeyChain: string[] = [];
|
|
|
|
/* where the decryption key is untrusted
|
|
*/
|
|
private untrusted: boolean = null;
|
|
|
|
/* if we have a process decrypting this event, a Promise which resolves
|
|
* when it is finished. Normally null.
|
|
*/
|
|
private _decryptionPromise: Promise<void> = null;
|
|
|
|
/* flag to indicate if we should retry decrypting this event after the
|
|
* first attempt (eg, we have received new data which means that a second
|
|
* attempt may succeed)
|
|
*/
|
|
private retryDecryption = false;
|
|
|
|
/* The txnId with which this event was sent if it was during this session,
|
|
* allows for a unique ID which does not change when the event comes back down sync.
|
|
*/
|
|
private txnId: string = null;
|
|
|
|
/**
|
|
* @experimental
|
|
* A reference to the thread this event belongs to
|
|
*/
|
|
private thread: Thread = null;
|
|
private threadId: string;
|
|
|
|
/* Set an approximate timestamp for the event relative the local clock.
|
|
* This will inherently be approximate because it doesn't take into account
|
|
* the time between the server putting the 'age' field on the event as it sent
|
|
* it to us and the time we're now constructing this event, but that's better
|
|
* than assuming the local clock is in sync with the origin HS's clock.
|
|
*/
|
|
public localTimestamp: number;
|
|
|
|
// XXX: these should be read-only
|
|
public sender: RoomMember = null;
|
|
public target: RoomMember = null;
|
|
public status: EventStatus = null;
|
|
public error: MatrixError = null;
|
|
public forwardLooking = true; // only state events may be backwards looking
|
|
|
|
/* If the event is a `m.key.verification.request` (or to_device `m.key.verification.start`) event,
|
|
* `Crypto` will set this the `VerificationRequest` for the event
|
|
* so it can be easily accessed from the timeline.
|
|
*/
|
|
public verificationRequest: VerificationRequest = null;
|
|
|
|
private readonly reEmitter: TypedReEmitter<EmittedEvents, MatrixEventHandlerMap>;
|
|
|
|
/**
|
|
* Construct a Matrix Event object
|
|
* @constructor
|
|
*
|
|
* @param {Object} event The raw event to be wrapped in this DAO
|
|
*
|
|
* @prop {Object} event The raw (possibly encrypted) event. <b>Do not access
|
|
* this property</b> directly unless you absolutely have to. Prefer the getter
|
|
* methods defined on this class. Using the getter methods shields your app
|
|
* from changes to event JSON between Matrix versions.
|
|
*
|
|
* @prop {RoomMember} sender The room member who sent this event, or null e.g.
|
|
* this is a presence event. This is only guaranteed to be set for events that
|
|
* appear in a timeline, ie. do not guarantee that it will be set on state
|
|
* events.
|
|
* @prop {RoomMember} target The room member who is the target of this event, e.g.
|
|
* the invitee, the person being banned, etc.
|
|
* @prop {EventStatus} status The sending status of the event.
|
|
* @prop {Error} error most recent error associated with sending the event, if any
|
|
* @prop {boolean} forwardLooking True if this event is 'forward looking', meaning
|
|
* that getDirectionalContent() will return event.content and not event.prev_content.
|
|
* Default: true. <strong>This property is experimental and may change.</strong>
|
|
*/
|
|
constructor(public event: Partial<IEvent> = {}) {
|
|
super();
|
|
|
|
// intern the values of matrix events to force share strings and reduce the
|
|
// amount of needless string duplication. This can save moderate amounts of
|
|
// memory (~10% on a 350MB heap).
|
|
// 'membership' at the event level (rather than the content level) is a legacy
|
|
// field that Element never otherwise looks at, but it will still take up a lot
|
|
// of space if we don't intern it.
|
|
["state_key", "type", "sender", "room_id", "membership"].forEach((prop) => {
|
|
if (typeof event[prop] !== "string") return;
|
|
event[prop] = internaliseString(event[prop]);
|
|
});
|
|
|
|
["membership", "avatar_url", "displayname"].forEach((prop) => {
|
|
if (typeof event.content?.[prop] !== "string") return;
|
|
event.content[prop] = internaliseString(event.content[prop]);
|
|
});
|
|
|
|
["rel_type"].forEach((prop) => {
|
|
if (typeof event.content?.["m.relates_to"]?.[prop] !== "string") return;
|
|
event.content["m.relates_to"][prop] = internaliseString(event.content["m.relates_to"][prop]);
|
|
});
|
|
|
|
this.txnId = event.txn_id || null;
|
|
this.localTimestamp = Date.now() - (this.getAge() ?? 0);
|
|
this.reEmitter = new TypedReEmitter(this);
|
|
}
|
|
|
|
/**
|
|
* Unstable getter to try and get an extensible event. Note that this might
|
|
* return a falsy value if the event could not be parsed as an extensible
|
|
* event.
|
|
*
|
|
* @deprecated Use stable functions where possible.
|
|
*/
|
|
public get unstableExtensibleEvent(): Optional<ExtensibleEvent> {
|
|
if (!this._hasCachedExtEv) {
|
|
this._cachedExtEv = ExtensibleEvents.parse(this.getEffectiveEvent());
|
|
}
|
|
return this._cachedExtEv;
|
|
}
|
|
|
|
private invalidateExtensibleEvent() {
|
|
// just reset the flag - that'll trick the getter into parsing a new event
|
|
this._hasCachedExtEv = false;
|
|
}
|
|
|
|
/**
|
|
* Gets the event as though it would appear unencrypted. If the event is already not
|
|
* encrypted, it is simply returned as-is.
|
|
* @returns {IEvent} The event in wire format.
|
|
*/
|
|
public getEffectiveEvent(): IEvent {
|
|
const content = Object.assign({}, this.getContent()); // clone for mutation
|
|
|
|
if (this.getWireType() === EventType.RoomMessageEncrypted) {
|
|
// Encrypted events sometimes aren't symmetrical on the `content` so we'll copy
|
|
// that over too, but only for missing properties. We don't copy over mismatches
|
|
// between the plain and decrypted copies of `content` because we assume that the
|
|
// app is relying on the decrypted version, so we want to expose that as a source
|
|
// of truth here too.
|
|
for (const [key, value] of Object.entries(this.getWireContent())) {
|
|
// Skip fields from the encrypted event schema though - we don't want to leak
|
|
// these.
|
|
if (["algorithm", "ciphertext", "device_id", "sender_key", "session_id"].includes(key)) {
|
|
continue;
|
|
}
|
|
|
|
if (content[key] === undefined) content[key] = value;
|
|
}
|
|
}
|
|
|
|
// clearEvent doesn't have all the fields, so we'll copy what we can from this.event.
|
|
// We also copy over our "fixed" content key.
|
|
return Object.assign({}, this.event, this.clearEvent, { content }) as IEvent;
|
|
}
|
|
|
|
/**
|
|
* Get the event_id for this event.
|
|
* @return {string} The event ID, e.g. <code>$143350589368169JsLZx:localhost
|
|
* </code>
|
|
*/
|
|
public getId(): string {
|
|
return this.event.event_id;
|
|
}
|
|
|
|
/**
|
|
* Get the user_id for this event.
|
|
* @return {string} The user ID, e.g. <code>@alice:matrix.org</code>
|
|
*/
|
|
public getSender(): string {
|
|
return this.event.sender || this.event.user_id; // v2 / v1
|
|
}
|
|
|
|
/**
|
|
* Get the (decrypted, if necessary) type of event.
|
|
*
|
|
* @return {string} The event type, e.g. <code>m.room.message</code>
|
|
*/
|
|
public getType(): EventType | string {
|
|
if (this.clearEvent) {
|
|
return this.clearEvent.type;
|
|
}
|
|
return this.event.type;
|
|
}
|
|
|
|
/**
|
|
* Get the (possibly encrypted) type of the event that will be sent to the
|
|
* homeserver.
|
|
*
|
|
* @return {string} The event type.
|
|
*/
|
|
public getWireType(): EventType | string {
|
|
return this.event.type;
|
|
}
|
|
|
|
/**
|
|
* Get the room_id for this event. This will return <code>undefined</code>
|
|
* for <code>m.presence</code> events.
|
|
* @return {string?} The room ID, e.g. <code>!cURbafjkfsMDVwdRDQ:matrix.org
|
|
* </code>
|
|
*/
|
|
public getRoomId(): string | undefined {
|
|
return this.event.room_id;
|
|
}
|
|
|
|
/**
|
|
* Get the timestamp of this event.
|
|
* @return {Number} The event timestamp, e.g. <code>1433502692297</code>
|
|
*/
|
|
public getTs(): number {
|
|
return this.event.origin_server_ts;
|
|
}
|
|
|
|
/**
|
|
* Get the timestamp of this event, as a Date object.
|
|
* @return {Date} The event date, e.g. <code>new Date(1433502692297)</code>
|
|
*/
|
|
public getDate(): Date | null {
|
|
return this.event.origin_server_ts ? new Date(this.event.origin_server_ts) : null;
|
|
}
|
|
|
|
/**
|
|
* Get the (decrypted, if necessary) event content JSON, even if the event
|
|
* was replaced by another event.
|
|
*
|
|
* @return {Object} The event content JSON, or an empty object.
|
|
*/
|
|
public getOriginalContent<T = IContent>(): T {
|
|
if (this._localRedactionEvent) {
|
|
return {} as T;
|
|
}
|
|
if (this.clearEvent) {
|
|
return (this.clearEvent.content || {}) as T;
|
|
}
|
|
return (this.event.content || {}) as T;
|
|
}
|
|
|
|
/**
|
|
* Get the (decrypted, if necessary) event content JSON,
|
|
* or the content from the replacing event, if any.
|
|
* See `makeReplaced`.
|
|
*
|
|
* @return {Object} The event content JSON, or an empty object.
|
|
*/
|
|
public getContent<T extends IContent = IContent>(): T {
|
|
if (this._localRedactionEvent) {
|
|
return {} as T;
|
|
} else if (this._replacingEvent) {
|
|
return this._replacingEvent.getContent()["m.new_content"] || {};
|
|
} else {
|
|
return this.getOriginalContent();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Get the (possibly encrypted) event content JSON that will be sent to the
|
|
* homeserver.
|
|
*
|
|
* @return {Object} The event content JSON, or an empty object.
|
|
*/
|
|
public getWireContent(): IContent {
|
|
return this.event.content || {};
|
|
}
|
|
|
|
/**
|
|
* @experimental
|
|
* Get the event ID of the thread head
|
|
*/
|
|
public get threadRootId(): string | undefined {
|
|
const relatesTo = this.getWireContent()?.["m.relates_to"];
|
|
if (relatesTo?.rel_type === THREAD_RELATION_TYPE.name) {
|
|
return relatesTo.event_id;
|
|
} else {
|
|
return this.getThread()?.id || this.threadId;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @experimental
|
|
*/
|
|
public get isThreadRoot(): boolean {
|
|
const threadDetails = this
|
|
.getServerAggregatedRelation<IThreadBundledRelationship>(THREAD_RELATION_TYPE.name);
|
|
|
|
// Bundled relationships only returned when the sync response is limited
|
|
// hence us having to check both bundled relation and inspect the thread
|
|
// model
|
|
return !!threadDetails || (this.getThread()?.id === this.getId());
|
|
}
|
|
|
|
public get replyEventId(): string {
|
|
// We're prefer ev.getContent() over ev.getWireContent() to make sure
|
|
// we grab the latest edit with potentially new relations. But we also
|
|
// can't just rely on ev.getContent() by itself because historically we
|
|
// still show the reply from the original message even though the edit
|
|
// event does not include the relation reply.
|
|
const mRelatesTo = this.getContent()['m.relates_to'] || this.getWireContent()['m.relates_to'];
|
|
return mRelatesTo?.['m.in_reply_to']?.event_id;
|
|
}
|
|
|
|
public get relationEventId(): string | undefined {
|
|
return this.getWireContent()
|
|
?.["m.relates_to"]
|
|
?.event_id;
|
|
}
|
|
|
|
/**
|
|
* Get the previous event content JSON. This will only return something for
|
|
* state events which exist in the timeline.
|
|
* @return {Object} The previous event content JSON, or an empty object.
|
|
*/
|
|
public getPrevContent(): IContent {
|
|
// v2 then v1 then default
|
|
return this.getUnsigned().prev_content || this.event.prev_content || {};
|
|
}
|
|
|
|
/**
|
|
* Get either 'content' or 'prev_content' depending on if this event is
|
|
* 'forward-looking' or not. This can be modified via event.forwardLooking.
|
|
* In practice, this means we get the chronologically earlier content value
|
|
* for this event (this method should surely be called getEarlierContent)
|
|
* <strong>This method is experimental and may change.</strong>
|
|
* @return {Object} event.content if this event is forward-looking, else
|
|
* event.prev_content.
|
|
*/
|
|
public getDirectionalContent(): IContent {
|
|
return this.forwardLooking ? this.getContent() : this.getPrevContent();
|
|
}
|
|
|
|
/**
|
|
* Get the age of this event. This represents the age of the event when the
|
|
* event arrived at the device, and not the age of the event when this
|
|
* function was called.
|
|
* Can only be returned once the server has echo'ed back
|
|
* @return {Number|undefined} The age of this event in milliseconds.
|
|
*/
|
|
public getAge(): number | undefined {
|
|
return this.getUnsigned().age || this.event.age; // v2 / v1
|
|
}
|
|
|
|
/**
|
|
* Get the age of the event when this function was called.
|
|
* This is the 'age' field adjusted according to how long this client has
|
|
* had the event.
|
|
* @return {Number} The age of this event in milliseconds.
|
|
*/
|
|
public getLocalAge(): number {
|
|
return Date.now() - this.localTimestamp;
|
|
}
|
|
|
|
/**
|
|
* Get the event state_key if it has one. This will return <code>undefined
|
|
* </code> for message events.
|
|
* @return {string} The event's <code>state_key</code>.
|
|
*/
|
|
public getStateKey(): string | undefined {
|
|
return this.event.state_key;
|
|
}
|
|
|
|
/**
|
|
* Check if this event is a state event.
|
|
* @return {boolean} True if this is a state event.
|
|
*/
|
|
public isState(): boolean {
|
|
return this.event.state_key !== undefined;
|
|
}
|
|
|
|
/**
|
|
* Replace the content of this event with encrypted versions.
|
|
* (This is used when sending an event; it should not be used by applications).
|
|
*
|
|
* @internal
|
|
*
|
|
* @param {string} cryptoType type of the encrypted event - typically
|
|
* <tt>"m.room.encrypted"</tt>
|
|
*
|
|
* @param {object} cryptoContent raw 'content' for the encrypted event.
|
|
*
|
|
* @param {string} senderCurve25519Key curve25519 key to record for the
|
|
* sender of this event.
|
|
* See {@link module:models/event.MatrixEvent#getSenderKey}.
|
|
*
|
|
* @param {string} claimedEd25519Key claimed ed25519 key to record for the
|
|
* sender if this event.
|
|
* See {@link module:models/event.MatrixEvent#getClaimedEd25519Key}
|
|
*/
|
|
public makeEncrypted(
|
|
cryptoType: string,
|
|
cryptoContent: object,
|
|
senderCurve25519Key: string,
|
|
claimedEd25519Key: string,
|
|
): void {
|
|
// keep the plain-text data for 'view source'
|
|
this.clearEvent = {
|
|
type: this.event.type,
|
|
content: this.event.content,
|
|
};
|
|
this.event.type = cryptoType;
|
|
this.event.content = cryptoContent;
|
|
this.senderCurve25519Key = senderCurve25519Key;
|
|
this.claimedEd25519Key = claimedEd25519Key;
|
|
}
|
|
|
|
/**
|
|
* Check if this event is currently being decrypted.
|
|
*
|
|
* @return {boolean} True if this event is currently being decrypted, else false.
|
|
*/
|
|
public isBeingDecrypted(): boolean {
|
|
return this._decryptionPromise != null;
|
|
}
|
|
|
|
public getDecryptionPromise(): Promise<void> {
|
|
return this._decryptionPromise;
|
|
}
|
|
|
|
/**
|
|
* Check if this event is an encrypted event which we failed to decrypt
|
|
*
|
|
* (This implies that we might retry decryption at some point in the future)
|
|
*
|
|
* @return {boolean} True if this event is an encrypted event which we
|
|
* couldn't decrypt.
|
|
*/
|
|
public isDecryptionFailure(): boolean {
|
|
return this.clearEvent?.content?.msgtype === "m.bad.encrypted";
|
|
}
|
|
|
|
public shouldAttemptDecryption() {
|
|
if (this.isRedacted()) return false;
|
|
if (this.isBeingDecrypted()) return false;
|
|
if (this.clearEvent) return false;
|
|
if (!this.isEncrypted()) return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* Start the process of trying to decrypt this event.
|
|
*
|
|
* (This is used within the SDK: it isn't intended for use by applications)
|
|
*
|
|
* @internal
|
|
*
|
|
* @param {module:crypto} crypto crypto module
|
|
* @param {object} options
|
|
* @param {boolean} options.isRetry True if this is a retry (enables more logging)
|
|
* @param {boolean} options.emit Emits "event.decrypted" if set to true
|
|
*
|
|
* @returns {Promise} promise which resolves (to undefined) when the decryption
|
|
* attempt is completed.
|
|
*/
|
|
public async attemptDecryption(crypto: Crypto, options: IDecryptOptions = {}): Promise<void> {
|
|
// For backwards compatibility purposes
|
|
// The function signature used to be attemptDecryption(crypto, isRetry)
|
|
if (typeof options === "boolean") {
|
|
options = {
|
|
isRetry: options,
|
|
};
|
|
}
|
|
|
|
// start with a couple of sanity checks.
|
|
if (!this.isEncrypted()) {
|
|
throw new Error("Attempt to decrypt event which isn't encrypted");
|
|
}
|
|
|
|
if (this.clearEvent && !this.isDecryptionFailure()) {
|
|
// we may want to just ignore this? let's start with rejecting it.
|
|
throw new Error(
|
|
"Attempt to decrypt event which has already been decrypted",
|
|
);
|
|
}
|
|
|
|
// if we already have a decryption attempt in progress, then it may
|
|
// fail because it was using outdated info. We now have reason to
|
|
// succeed where it failed before, but we don't want to have multiple
|
|
// attempts going at the same time, so just set a flag that says we have
|
|
// new info.
|
|
//
|
|
if (this._decryptionPromise) {
|
|
logger.log(
|
|
`Event ${this.getId()} already being decrypted; queueing a retry`,
|
|
);
|
|
this.retryDecryption = true;
|
|
return this._decryptionPromise;
|
|
}
|
|
|
|
this._decryptionPromise = this.decryptionLoop(crypto, options);
|
|
return this._decryptionPromise;
|
|
}
|
|
|
|
/**
|
|
* Cancel any room key request for this event and resend another.
|
|
*
|
|
* @param {module:crypto} crypto crypto module
|
|
* @param {string} userId the user who received this event
|
|
*
|
|
* @returns {Promise} a promise that resolves when the request is queued
|
|
*/
|
|
public cancelAndResendKeyRequest(crypto: Crypto, userId: string): Promise<void> {
|
|
const wireContent = this.getWireContent();
|
|
return crypto.requestRoomKey({
|
|
algorithm: wireContent.algorithm,
|
|
room_id: this.getRoomId(),
|
|
session_id: wireContent.session_id,
|
|
sender_key: wireContent.sender_key,
|
|
}, this.getKeyRequestRecipients(userId), true);
|
|
}
|
|
|
|
/**
|
|
* Calculate the recipients for keyshare requests.
|
|
*
|
|
* @param {string} userId the user who received this event.
|
|
*
|
|
* @returns {Array} array of recipients
|
|
*/
|
|
public getKeyRequestRecipients(userId: string): IKeyRequestRecipient[] {
|
|
// send the request to all of our own devices, and the
|
|
// original sending device if it wasn't us.
|
|
const wireContent = this.getWireContent();
|
|
const recipients = [{
|
|
userId, deviceId: '*',
|
|
}];
|
|
const sender = this.getSender();
|
|
if (sender !== userId) {
|
|
recipients.push({
|
|
userId: sender, deviceId: wireContent.device_id,
|
|
});
|
|
}
|
|
return recipients;
|
|
}
|
|
|
|
private async decryptionLoop(crypto: Crypto, options: IDecryptOptions = {}): Promise<void> {
|
|
// make sure that this method never runs completely synchronously.
|
|
// (doing so would mean that we would clear _decryptionPromise *before*
|
|
// it is set in attemptDecryption - and hence end up with a stuck
|
|
// `_decryptionPromise`).
|
|
await Promise.resolve();
|
|
|
|
// eslint-disable-next-line no-constant-condition
|
|
while (true) {
|
|
this.retryDecryption = false;
|
|
|
|
let res: IEventDecryptionResult;
|
|
let err: Error;
|
|
try {
|
|
if (!crypto) {
|
|
res = this.badEncryptedMessage("Encryption not enabled");
|
|
} else {
|
|
res = await crypto.decryptEvent(this);
|
|
if (options.isRetry === true) {
|
|
logger.info(`Decrypted event on retry (id=${this.getId()})`);
|
|
}
|
|
}
|
|
} catch (e) {
|
|
if (e.name !== "DecryptionError") {
|
|
// not a decryption error: log the whole exception as an error
|
|
// (and don't bother with a retry)
|
|
const re = options.isRetry ? 're' : '';
|
|
// For find results: this can produce "Error decrypting event (id=$ev)" and
|
|
// "Error redecrypting event (id=$ev)".
|
|
logger.error(
|
|
`Error ${re}decrypting event ` +
|
|
`(id=${this.getId()}): ${e.stack || e}`,
|
|
);
|
|
this._decryptionPromise = null;
|
|
this.retryDecryption = false;
|
|
return;
|
|
}
|
|
|
|
err = e;
|
|
|
|
// see if we have a retry queued.
|
|
//
|
|
// NB: make sure to keep this check in the same tick of the
|
|
// event loop as `_decryptionPromise = null` below - otherwise we
|
|
// risk a race:
|
|
//
|
|
// * A: we check retryDecryption here and see that it is
|
|
// false
|
|
// * B: we get a second call to attemptDecryption, which sees
|
|
// that _decryptionPromise is set so sets
|
|
// retryDecryption
|
|
// * A: we continue below, clear _decryptionPromise, and
|
|
// never do the retry.
|
|
//
|
|
if (this.retryDecryption) {
|
|
// decryption error, but we have a retry queued.
|
|
logger.log(`Got error decrypting event (id=${this.getId()}: ${e.detailedString}), but retrying`, e);
|
|
continue;
|
|
}
|
|
|
|
// decryption error, no retries queued. Warn about the error and
|
|
// set it to m.bad.encrypted.
|
|
logger.warn(`Got error decrypting event (id=${this.getId()}: ${e.detailedString})`, e);
|
|
|
|
res = this.badEncryptedMessage(e.message);
|
|
}
|
|
|
|
// at this point, we've either successfully decrypted the event, or have given up
|
|
// (and set res to a 'badEncryptedMessage'). Either way, we can now set the
|
|
// cleartext of the event and raise Event.decrypted.
|
|
//
|
|
// make sure we clear '_decryptionPromise' before sending the 'Event.decrypted' event,
|
|
// otherwise the app will be confused to see `isBeingDecrypted` still set when
|
|
// there isn't an `Event.decrypted` on the way.
|
|
//
|
|
// see also notes on retryDecryption above.
|
|
//
|
|
this._decryptionPromise = null;
|
|
this.retryDecryption = false;
|
|
this.setClearData(res);
|
|
|
|
// Before we emit the event, clear the push actions so that they can be recalculated
|
|
// by relevant code. We do this because the clear event has now changed, making it
|
|
// so that existing rules can be re-run over the applicable properties. Stuff like
|
|
// highlighting when the user's name is mentioned rely on this happening. We also want
|
|
// to set the push actions before emitting so that any notification listeners don't
|
|
// pick up the wrong contents.
|
|
this.setPushActions(null);
|
|
|
|
if (options.emit !== false) {
|
|
this.emit(MatrixEventEvent.Decrypted, this, err);
|
|
}
|
|
|
|
return;
|
|
}
|
|
}
|
|
|
|
private badEncryptedMessage(reason: string): IEventDecryptionResult {
|
|
return {
|
|
clearEvent: {
|
|
type: EventType.RoomMessage,
|
|
content: {
|
|
msgtype: "m.bad.encrypted",
|
|
body: "** Unable to decrypt: " + reason + " **",
|
|
},
|
|
},
|
|
};
|
|
}
|
|
|
|
/**
|
|
* Update the cleartext data on this event.
|
|
*
|
|
* (This is used after decrypting an event; it should not be used by applications).
|
|
*
|
|
* @internal
|
|
*
|
|
* @fires module:models/event.MatrixEvent#"Event.decrypted"
|
|
*
|
|
* @param {module:crypto~EventDecryptionResult} decryptionResult
|
|
* the decryption result, including the plaintext and some key info
|
|
*/
|
|
private setClearData(decryptionResult: IEventDecryptionResult): void {
|
|
this.clearEvent = decryptionResult.clearEvent;
|
|
this.senderCurve25519Key =
|
|
decryptionResult.senderCurve25519Key || null;
|
|
this.claimedEd25519Key =
|
|
decryptionResult.claimedEd25519Key || null;
|
|
this.forwardingCurve25519KeyChain =
|
|
decryptionResult.forwardingCurve25519KeyChain || [];
|
|
this.untrusted = decryptionResult.untrusted || false;
|
|
this.invalidateExtensibleEvent();
|
|
}
|
|
|
|
/**
|
|
* Gets the cleartext content for this event. If the event is not encrypted,
|
|
* or encryption has not been completed, this will return null.
|
|
*
|
|
* @returns {Object} The cleartext (decrypted) content for the event
|
|
*/
|
|
public getClearContent(): IContent | null {
|
|
return this.clearEvent ? this.clearEvent.content : null;
|
|
}
|
|
|
|
/**
|
|
* Check if the event is encrypted.
|
|
* @return {boolean} True if this event is encrypted.
|
|
*/
|
|
public isEncrypted(): boolean {
|
|
return !this.isState() && this.event.type === EventType.RoomMessageEncrypted;
|
|
}
|
|
|
|
/**
|
|
* The curve25519 key for the device that we think sent this event
|
|
*
|
|
* For an Olm-encrypted event, this is inferred directly from the DH
|
|
* exchange at the start of the session: the curve25519 key is involved in
|
|
* the DH exchange, so only a device which holds the private part of that
|
|
* key can establish such a session.
|
|
*
|
|
* For a megolm-encrypted event, it is inferred from the Olm message which
|
|
* established the megolm session
|
|
*
|
|
* @return {string}
|
|
*/
|
|
public getSenderKey(): string | null {
|
|
return this.senderCurve25519Key;
|
|
}
|
|
|
|
/**
|
|
* The additional keys the sender of this encrypted event claims to possess.
|
|
*
|
|
* Just a wrapper for #getClaimedEd25519Key (q.v.)
|
|
*
|
|
* @return {Object<string, string>}
|
|
*/
|
|
public getKeysClaimed(): Record<"ed25519", string> {
|
|
return {
|
|
ed25519: this.claimedEd25519Key,
|
|
};
|
|
}
|
|
|
|
/**
|
|
* Get the ed25519 the sender of this event claims to own.
|
|
*
|
|
* For Olm messages, this claim is encoded directly in the plaintext of the
|
|
* event itself. For megolm messages, it is implied by the m.room_key event
|
|
* which established the megolm session.
|
|
*
|
|
* Until we download the device list of the sender, it's just a claim: the
|
|
* device list gives a proof that the owner of the curve25519 key used for
|
|
* this event (and returned by #getSenderKey) also owns the ed25519 key by
|
|
* signing the public curve25519 key with the ed25519 key.
|
|
*
|
|
* In general, applications should not use this method directly, but should
|
|
* instead use MatrixClient.getEventSenderDeviceInfo.
|
|
*
|
|
* @return {string}
|
|
*/
|
|
public getClaimedEd25519Key(): string | null {
|
|
return this.claimedEd25519Key;
|
|
}
|
|
|
|
/**
|
|
* Get the curve25519 keys of the devices which were involved in telling us
|
|
* about the claimedEd25519Key and sender curve25519 key.
|
|
*
|
|
* Normally this will be empty, but in the case of a forwarded megolm
|
|
* session, the sender keys are sent to us by another device (the forwarding
|
|
* device), which we need to trust to do this. In that case, the result will
|
|
* be a list consisting of one entry.
|
|
*
|
|
* If the device that sent us the key (A) got it from another device which
|
|
* it wasn't prepared to vouch for (B), the result will be [A, B]. And so on.
|
|
*
|
|
* @return {string[]} base64-encoded curve25519 keys, from oldest to newest.
|
|
*/
|
|
public getForwardingCurve25519KeyChain(): string[] {
|
|
return this.forwardingCurve25519KeyChain;
|
|
}
|
|
|
|
/**
|
|
* Whether the decryption key was obtained from an untrusted source. If so,
|
|
* we cannot verify the authenticity of the message.
|
|
*
|
|
* @return {boolean}
|
|
*/
|
|
public isKeySourceUntrusted(): boolean {
|
|
return this.untrusted;
|
|
}
|
|
|
|
public getUnsigned(): IUnsigned {
|
|
return this.event.unsigned || {};
|
|
}
|
|
|
|
public setUnsigned(unsigned: IUnsigned): void {
|
|
this.event.unsigned = unsigned;
|
|
}
|
|
|
|
public unmarkLocallyRedacted(): boolean {
|
|
const value = this._localRedactionEvent;
|
|
this._localRedactionEvent = null;
|
|
if (this.event.unsigned) {
|
|
this.event.unsigned.redacted_because = null;
|
|
}
|
|
return !!value;
|
|
}
|
|
|
|
public markLocallyRedacted(redactionEvent: MatrixEvent): void {
|
|
if (this._localRedactionEvent) return;
|
|
this.emit(MatrixEventEvent.BeforeRedaction, this, redactionEvent);
|
|
this._localRedactionEvent = redactionEvent;
|
|
if (!this.event.unsigned) {
|
|
this.event.unsigned = {};
|
|
}
|
|
this.event.unsigned.redacted_because = redactionEvent.event as IEvent;
|
|
}
|
|
|
|
/**
|
|
* Change the visibility of an event, as per https://github.com/matrix-org/matrix-doc/pull/3531 .
|
|
*
|
|
* @fires module:models/event.MatrixEvent#"Event.visibilityChange" if `visibilityEvent`
|
|
* caused a change in the actual visibility of this event, either by making it
|
|
* visible (if it was hidden), by making it hidden (if it was visible) or by
|
|
* changing the reason (if it was hidden).
|
|
* @param visibilityChange event holding a hide/unhide payload, or nothing
|
|
* if the event is being reset to its original visibility (presumably
|
|
* by a visibility event being redacted).
|
|
*/
|
|
public applyVisibilityEvent(visibilityChange?: IVisibilityChange): void {
|
|
const visible = visibilityChange ? visibilityChange.visible : true;
|
|
const reason = visibilityChange ? visibilityChange.reason : null;
|
|
let change = false;
|
|
if (this.visibility.visible !== visibilityChange.visible) {
|
|
change = true;
|
|
} else if (!this.visibility.visible && this.visibility["reason"] !== reason) {
|
|
change = true;
|
|
}
|
|
if (change) {
|
|
if (visible) {
|
|
this.visibility = MESSAGE_VISIBLE;
|
|
} else {
|
|
this.visibility = Object.freeze({
|
|
visible: false,
|
|
reason: reason,
|
|
});
|
|
}
|
|
this.emit(MatrixEventEvent.VisibilityChange, this, visible);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Return instructions to display or hide the message.
|
|
*
|
|
* @returns Instructions determining whether the message
|
|
* should be displayed.
|
|
*/
|
|
public messageVisibility(): MessageVisibility {
|
|
// Note: We may return `this.visibility` without fear, as
|
|
// this is a shallow frozen object.
|
|
return this.visibility;
|
|
}
|
|
|
|
/**
|
|
* Update the content of an event in the same way it would be by the server
|
|
* if it were redacted before it was sent to us
|
|
*
|
|
* @param {module:models/event.MatrixEvent} redactionEvent
|
|
* event causing the redaction
|
|
*/
|
|
public makeRedacted(redactionEvent: MatrixEvent): void {
|
|
// quick sanity-check
|
|
if (!redactionEvent.event) {
|
|
throw new Error("invalid redactionEvent in makeRedacted");
|
|
}
|
|
|
|
this._localRedactionEvent = null;
|
|
|
|
this.emit(MatrixEventEvent.BeforeRedaction, this, redactionEvent);
|
|
|
|
this._replacingEvent = null;
|
|
// we attempt to replicate what we would see from the server if
|
|
// the event had been redacted before we saw it.
|
|
//
|
|
// The server removes (most of) the content of the event, and adds a
|
|
// "redacted_because" key to the unsigned section containing the
|
|
// redacted event.
|
|
if (!this.event.unsigned) {
|
|
this.event.unsigned = {};
|
|
}
|
|
this.event.unsigned.redacted_because = redactionEvent.event as IEvent;
|
|
|
|
for (const key in this.event) {
|
|
if (this.event.hasOwnProperty(key) && !REDACT_KEEP_KEYS.has(key)) {
|
|
delete this.event[key];
|
|
}
|
|
}
|
|
|
|
// If the event is encrypted prune the decrypted bits
|
|
if (this.isEncrypted()) {
|
|
this.clearEvent = null;
|
|
}
|
|
|
|
const keeps = REDACT_KEEP_CONTENT_MAP[this.getType()] || {};
|
|
const content = this.getContent();
|
|
for (const key in content) {
|
|
if (content.hasOwnProperty(key) && !keeps[key]) {
|
|
delete content[key];
|
|
}
|
|
}
|
|
|
|
this.invalidateExtensibleEvent();
|
|
}
|
|
|
|
/**
|
|
* Check if this event has been redacted
|
|
*
|
|
* @return {boolean} True if this event has been redacted
|
|
*/
|
|
public isRedacted(): boolean {
|
|
return Boolean(this.getUnsigned().redacted_because);
|
|
}
|
|
|
|
/**
|
|
* Check if this event is a redaction of another event
|
|
*
|
|
* @return {boolean} True if this event is a redaction
|
|
*/
|
|
public isRedaction(): boolean {
|
|
return this.getType() === EventType.RoomRedaction;
|
|
}
|
|
|
|
/**
|
|
* Return the visibility change caused by this event,
|
|
* as per https://github.com/matrix-org/matrix-doc/pull/3531.
|
|
*
|
|
* @returns If the event is a well-formed visibility change event,
|
|
* an instance of `IVisibilityChange`, otherwise `null`.
|
|
*/
|
|
public asVisibilityChange(): IVisibilityChange | null {
|
|
if (!EVENT_VISIBILITY_CHANGE_TYPE.matches(this.getType())) {
|
|
// Not a visibility change event.
|
|
return null;
|
|
}
|
|
const relation = this.getRelation();
|
|
if (!relation || relation.rel_type != "m.reference") {
|
|
// Ill-formed, ignore this event.
|
|
return null;
|
|
}
|
|
const eventId = relation.event_id;
|
|
if (!eventId) {
|
|
// Ill-formed, ignore this event.
|
|
return null;
|
|
}
|
|
const content = this.getWireContent();
|
|
const visible = !!content.visible;
|
|
const reason = content.reason;
|
|
if (reason && typeof reason != "string") {
|
|
// Ill-formed, ignore this event.
|
|
return null;
|
|
}
|
|
// Well-formed visibility change event.
|
|
return {
|
|
visible,
|
|
reason,
|
|
eventId,
|
|
};
|
|
}
|
|
|
|
/**
|
|
* Check if this event alters the visibility of another event,
|
|
* as per https://github.com/matrix-org/matrix-doc/pull/3531.
|
|
*
|
|
* @returns {boolean} True if this event alters the visibility
|
|
* of another event.
|
|
*/
|
|
public isVisibilityEvent(): boolean {
|
|
return EVENT_VISIBILITY_CHANGE_TYPE.matches(this.getType());
|
|
}
|
|
|
|
/**
|
|
* Get the (decrypted, if necessary) redaction event JSON
|
|
* if event was redacted
|
|
*
|
|
* @returns {object} The redaction event JSON, or an empty object
|
|
*/
|
|
public getRedactionEvent(): object | null {
|
|
if (!this.isRedacted()) return null;
|
|
|
|
if (this.clearEvent?.unsigned) {
|
|
return this.clearEvent?.unsigned.redacted_because;
|
|
} else if (this.event.unsigned.redacted_because) {
|
|
return this.event.unsigned.redacted_because;
|
|
} else {
|
|
return {};
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Get the push actions, if known, for this event
|
|
*
|
|
* @return {?Object} push actions
|
|
*/
|
|
public getPushActions(): IActionsObject | null {
|
|
return this.pushActions;
|
|
}
|
|
|
|
/**
|
|
* Set the push actions for this event.
|
|
*
|
|
* @param {Object} pushActions push actions
|
|
*/
|
|
public setPushActions(pushActions: IActionsObject): void {
|
|
this.pushActions = pushActions;
|
|
}
|
|
|
|
/**
|
|
* Replace the `event` property and recalculate any properties based on it.
|
|
* @param {Object} event the object to assign to the `event` property
|
|
*/
|
|
public handleRemoteEcho(event: object): void {
|
|
const oldUnsigned = this.getUnsigned();
|
|
const oldId = this.getId();
|
|
this.event = event;
|
|
// if this event was redacted before it was sent, it's locally marked as redacted.
|
|
// At this point, we've received the remote echo for the event, but not yet for
|
|
// the redaction that we are sending ourselves. Preserve the locally redacted
|
|
// state by copying over redacted_because so we don't get a flash of
|
|
// redacted, not-redacted, redacted as remote echos come in
|
|
if (oldUnsigned.redacted_because) {
|
|
if (!this.event.unsigned) {
|
|
this.event.unsigned = {};
|
|
}
|
|
this.event.unsigned.redacted_because = oldUnsigned.redacted_because;
|
|
}
|
|
// successfully sent.
|
|
this.setStatus(null);
|
|
if (this.getId() !== oldId) {
|
|
// emit the event if it changed
|
|
this.emit(MatrixEventEvent.LocalEventIdReplaced, this);
|
|
}
|
|
|
|
this.localTimestamp = Date.now() - this.getAge();
|
|
}
|
|
|
|
/**
|
|
* Whether the event is in any phase of sending, send failure, waiting for
|
|
* remote echo, etc.
|
|
*
|
|
* @return {boolean}
|
|
*/
|
|
public isSending(): boolean {
|
|
return !!this.status;
|
|
}
|
|
|
|
/**
|
|
* Update the event's sending status and emit an event as well.
|
|
*
|
|
* @param {String} status The new status
|
|
*/
|
|
public setStatus(status: EventStatus): void {
|
|
this.status = status;
|
|
this.emit(MatrixEventEvent.Status, this, status);
|
|
}
|
|
|
|
public replaceLocalEventId(eventId: string): void {
|
|
this.event.event_id = eventId;
|
|
this.emit(MatrixEventEvent.LocalEventIdReplaced, this);
|
|
}
|
|
|
|
/**
|
|
* Get whether the event is a relation event, and of a given type if
|
|
* `relType` is passed in. State events cannot be relation events
|
|
*
|
|
* @param {string?} relType if given, checks that the relation is of the
|
|
* given type
|
|
* @return {boolean}
|
|
*/
|
|
public isRelation(relType: string = undefined): boolean {
|
|
// Relation info is lifted out of the encrypted content when sent to
|
|
// encrypted rooms, so we have to check `getWireContent` for this.
|
|
const relation = this.getWireContent()?.["m.relates_to"];
|
|
if (this.isState() && relation?.rel_type === RelationType.Replace) {
|
|
// State events cannot be m.replace relations
|
|
return false;
|
|
}
|
|
return relation?.rel_type && relation.event_id && (relType ? relation.rel_type === relType : true);
|
|
}
|
|
|
|
/**
|
|
* Get relation info for the event, if any.
|
|
*
|
|
* @return {Object}
|
|
*/
|
|
public getRelation(): IEventRelation | null {
|
|
if (!this.isRelation()) {
|
|
return null;
|
|
}
|
|
return this.getWireContent()["m.relates_to"];
|
|
}
|
|
|
|
/**
|
|
* Set an event that replaces the content of this event, through an m.replace relation.
|
|
*
|
|
* @fires module:models/event.MatrixEvent#"Event.replaced"
|
|
*
|
|
* @param {MatrixEvent?} newEvent the event with the replacing content, if any.
|
|
*/
|
|
public makeReplaced(newEvent?: MatrixEvent): void {
|
|
// don't allow redacted events to be replaced.
|
|
// if newEvent is null we allow to go through though,
|
|
// as with local redaction, the replacing event might get
|
|
// cancelled, which should be reflected on the target event.
|
|
if (this.isRedacted() && newEvent) {
|
|
return;
|
|
}
|
|
// don't allow state events to be replaced using this mechanism as per MSC2676
|
|
if (this.isState()) {
|
|
return;
|
|
}
|
|
if (this._replacingEvent !== newEvent) {
|
|
this._replacingEvent = newEvent;
|
|
this.emit(MatrixEventEvent.Replaced, this);
|
|
this.invalidateExtensibleEvent();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Returns the status of any associated edit or redaction
|
|
* (not for reactions/annotations as their local echo doesn't affect the original event),
|
|
* or else the status of the event.
|
|
*
|
|
* @return {EventStatus}
|
|
*/
|
|
public getAssociatedStatus(): EventStatus | undefined {
|
|
if (this._replacingEvent) {
|
|
return this._replacingEvent.status;
|
|
} else if (this._localRedactionEvent) {
|
|
return this._localRedactionEvent.status;
|
|
}
|
|
return this.status;
|
|
}
|
|
|
|
public getServerAggregatedRelation<T>(relType: RelationType | string): T | undefined {
|
|
return this.getUnsigned()["m.relations"]?.[relType];
|
|
}
|
|
|
|
/**
|
|
* Returns the event ID of the event replacing the content of this event, if any.
|
|
*
|
|
* @return {string?}
|
|
*/
|
|
public replacingEventId(): string | undefined {
|
|
const replaceRelation = this.getServerAggregatedRelation<IAggregatedRelation>(RelationType.Replace);
|
|
if (replaceRelation) {
|
|
return replaceRelation.event_id;
|
|
} else if (this._replacingEvent) {
|
|
return this._replacingEvent.getId();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Returns the event replacing the content of this event, if any.
|
|
* Replacements are aggregated on the server, so this would only
|
|
* return an event in case it came down the sync, or for local echo of edits.
|
|
*
|
|
* @return {MatrixEvent?}
|
|
*/
|
|
public replacingEvent(): MatrixEvent | undefined {
|
|
return this._replacingEvent;
|
|
}
|
|
|
|
/**
|
|
* Returns the origin_server_ts of the event replacing the content of this event, if any.
|
|
*
|
|
* @return {Date?}
|
|
*/
|
|
public replacingEventDate(): Date | undefined {
|
|
const replaceRelation = this.getServerAggregatedRelation<IAggregatedRelation>(RelationType.Replace);
|
|
if (replaceRelation) {
|
|
const ts = replaceRelation.origin_server_ts;
|
|
if (Number.isFinite(ts)) {
|
|
return new Date(ts);
|
|
}
|
|
} else if (this._replacingEvent) {
|
|
return this._replacingEvent.getDate();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Returns the event that wants to redact this event, but hasn't been sent yet.
|
|
* @return {MatrixEvent} the event
|
|
*/
|
|
public localRedactionEvent(): MatrixEvent | undefined {
|
|
return this._localRedactionEvent;
|
|
}
|
|
|
|
/**
|
|
* For relations and redactions, returns the event_id this event is referring to.
|
|
*
|
|
* @return {string?}
|
|
*/
|
|
public getAssociatedId(): string | undefined {
|
|
const relation = this.getRelation();
|
|
if (this.replyEventId) {
|
|
return this.replyEventId;
|
|
} else if (relation) {
|
|
return relation.event_id;
|
|
} else if (this.isRedaction()) {
|
|
return this.event.redacts;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Checks if this event is associated with another event. See `getAssociatedId`.
|
|
*
|
|
* @return {boolean}
|
|
*/
|
|
public hasAssocation(): boolean {
|
|
return !!this.getAssociatedId();
|
|
}
|
|
|
|
/**
|
|
* Update the related id with a new one.
|
|
*
|
|
* Used to replace a local id with remote one before sending
|
|
* an event with a related id.
|
|
*
|
|
* @param {string} eventId the new event id
|
|
*/
|
|
public updateAssociatedId(eventId: string): void {
|
|
const relation = this.getRelation();
|
|
if (relation) {
|
|
relation.event_id = eventId;
|
|
} else if (this.isRedaction()) {
|
|
this.event.redacts = eventId;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Flags an event as cancelled due to future conditions. For example, a verification
|
|
* request event in the same sync transaction may be flagged as cancelled to warn
|
|
* listeners that a cancellation event is coming down the same pipe shortly.
|
|
* @param {boolean} cancelled Whether the event is to be cancelled or not.
|
|
*/
|
|
public flagCancelled(cancelled = true): void {
|
|
this._isCancelled = cancelled;
|
|
}
|
|
|
|
/**
|
|
* Gets whether or not the event is flagged as cancelled. See flagCancelled() for
|
|
* more information.
|
|
* @returns {boolean} True if the event is cancelled, false otherwise.
|
|
*/
|
|
isCancelled(): boolean {
|
|
return this._isCancelled;
|
|
}
|
|
|
|
/**
|
|
* Get a copy/snapshot of this event. The returned copy will be loosely linked
|
|
* back to this instance, though will have "frozen" event information. Other
|
|
* properties of this MatrixEvent instance will be copied verbatim, which can
|
|
* mean they are in reference to this instance despite being on the copy too.
|
|
* The reference the snapshot uses does not change, however members aside from
|
|
* the underlying event will not be deeply cloned, thus may be mutated internally.
|
|
* For example, the sender profile will be copied over at snapshot time, and
|
|
* the sender profile internally may mutate without notice to the consumer.
|
|
*
|
|
* This is meant to be used to snapshot the event details themselves, not the
|
|
* features (such as sender) surrounding the event.
|
|
* @returns {MatrixEvent} A snapshot of this event.
|
|
*/
|
|
toSnapshot(): MatrixEvent {
|
|
const ev = new MatrixEvent(JSON.parse(JSON.stringify(this.event)));
|
|
for (const [p, v] of Object.entries(this)) {
|
|
if (p !== "event") { // exclude the thing we just cloned
|
|
ev[p] = v;
|
|
}
|
|
}
|
|
return ev;
|
|
}
|
|
|
|
/**
|
|
* Determines if this event is equivalent to the given event. This only checks
|
|
* the event object itself, not the other properties of the event. Intended for
|
|
* use with toSnapshot() to identify events changing.
|
|
* @param {MatrixEvent} otherEvent The other event to check against.
|
|
* @returns {boolean} True if the events are the same, false otherwise.
|
|
*/
|
|
isEquivalentTo(otherEvent: MatrixEvent): boolean {
|
|
if (!otherEvent) return false;
|
|
if (otherEvent === this) return true;
|
|
const myProps = deepSortedObjectEntries(this.event);
|
|
const theirProps = deepSortedObjectEntries(otherEvent.event);
|
|
return JSON.stringify(myProps) === JSON.stringify(theirProps);
|
|
}
|
|
|
|
/**
|
|
* Summarise the event as JSON. This is currently used by React SDK's view
|
|
* event source feature and Seshat's event indexing, so take care when
|
|
* adjusting the output here.
|
|
*
|
|
* If encrypted, include both the decrypted and encrypted view of the event.
|
|
*
|
|
* This is named `toJSON` for use with `JSON.stringify` which checks objects
|
|
* for functions named `toJSON` and will call them to customise the output
|
|
* if they are defined.
|
|
*
|
|
* @return {Object}
|
|
*/
|
|
public toJSON(): object {
|
|
const event = this.getEffectiveEvent();
|
|
|
|
if (!this.isEncrypted()) {
|
|
return event;
|
|
}
|
|
|
|
return {
|
|
decrypted: event,
|
|
encrypted: this.event,
|
|
};
|
|
}
|
|
|
|
public setVerificationRequest(request: VerificationRequest): void {
|
|
this.verificationRequest = request;
|
|
}
|
|
|
|
public setTxnId(txnId: string): void {
|
|
this.txnId = txnId;
|
|
}
|
|
|
|
public getTxnId(): string | undefined {
|
|
return this.txnId;
|
|
}
|
|
|
|
/**
|
|
* @experimental
|
|
*/
|
|
public setThread(thread: Thread): void {
|
|
this.thread = thread;
|
|
this.setThreadId(thread.id);
|
|
this.reEmitter.reEmit(thread, [ThreadEvent.Update]);
|
|
}
|
|
|
|
/**
|
|
* @experimental
|
|
*/
|
|
public getThread(): Thread | undefined {
|
|
return this.thread;
|
|
}
|
|
|
|
public setThreadId(threadId: string): void {
|
|
this.threadId = threadId;
|
|
}
|
|
}
|
|
|
|
/* REDACT_KEEP_KEYS gives the keys we keep when an event is redacted
|
|
*
|
|
* This is specified here:
|
|
* http://matrix.org/speculator/spec/HEAD/client_server/latest.html#redactions
|
|
*
|
|
* Also:
|
|
* - We keep 'unsigned' since that is created by the local server
|
|
* - We keep user_id for backwards-compat with v1
|
|
*/
|
|
const REDACT_KEEP_KEYS = new Set([
|
|
'event_id', 'type', 'room_id', 'user_id', 'sender', 'state_key', 'prev_state',
|
|
'content', 'unsigned', 'origin_server_ts',
|
|
]);
|
|
|
|
// a map from state event type to the .content keys we keep when an event is redacted
|
|
const REDACT_KEEP_CONTENT_MAP = {
|
|
[EventType.RoomMember]: { 'membership': 1 },
|
|
[EventType.RoomCreate]: { 'creator': 1 },
|
|
[EventType.RoomJoinRules]: { 'join_rule': 1 },
|
|
[EventType.RoomPowerLevels]: {
|
|
'ban': 1, 'events': 1, 'events_default': 1,
|
|
'kick': 1, 'redact': 1, 'state_default': 1,
|
|
'users': 1, 'users_default': 1,
|
|
},
|
|
[EventType.RoomAliases]: { 'aliases': 1 },
|
|
};
|
|
|
|
/**
|
|
* Fires when an event is decrypted
|
|
*
|
|
* @event module:models/event.MatrixEvent#"Event.decrypted"
|
|
*
|
|
* @param {module:models/event.MatrixEvent} event
|
|
* The matrix event which has been decrypted
|
|
* @param {module:crypto/algorithms/base.DecryptionError?} err
|
|
* The error that occurred during decryption, or `undefined` if no
|
|
* error occurred.
|
|
*/
|