2016-06-09 01:03:46 +03:00
|
|
|
/*
|
|
|
|
Copyright 2015, 2016 OpenMarket Ltd
|
2020-01-23 16:54:28 +03:00
|
|
|
Copyright 2019, 2020 The Matrix.org Foundation C.I.C.
|
2016-06-09 01:03:46 +03:00
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2020-07-03 00:38:11 +03:00
|
|
|
import {MatrixClient} from "matrix-js-sdk/src/client";
|
2020-07-03 01:22:36 +03:00
|
|
|
import {Room} from "matrix-js-sdk/src/models/room";
|
2020-07-03 00:38:11 +03:00
|
|
|
|
2019-12-21 00:13:46 +03:00
|
|
|
import {MatrixClientPeg} from './MatrixClientPeg';
|
2017-07-01 16:40:46 +03:00
|
|
|
import Modal from './Modal';
|
2019-12-20 04:19:56 +03:00
|
|
|
import * as sdk from './index';
|
2017-05-25 13:39:08 +03:00
|
|
|
import { _t } from './languageHandler';
|
2020-05-14 05:41:41 +03:00
|
|
|
import dis from "./dispatcher/dispatcher";
|
2017-07-05 17:00:50 +03:00
|
|
|
import * as Rooms from "./Rooms";
|
2019-12-19 19:43:10 +03:00
|
|
|
import DMRoomMap from "./utils/DMRoomMap";
|
2018-01-25 12:54:31 +03:00
|
|
|
import {getAddressType} from "./UserAddress";
|
2020-08-14 15:27:12 +03:00
|
|
|
import { getE2EEWellKnown } from "./utils/WellKnownUtils";
|
2016-06-09 01:03:46 +03:00
|
|
|
|
2020-07-20 22:50:12 +03:00
|
|
|
// we define a number of interfaces which take their names from the js-sdk
|
2020-07-20 22:43:49 +03:00
|
|
|
/* eslint-disable camelcase */
|
|
|
|
|
2020-07-03 00:38:11 +03:00
|
|
|
// TODO move these interfaces over to js-sdk once it has been typescripted enough to accept them
|
|
|
|
enum Visibility {
|
|
|
|
Public = "public",
|
|
|
|
Private = "private",
|
|
|
|
}
|
|
|
|
|
|
|
|
enum Preset {
|
|
|
|
PrivateChat = "private_chat",
|
|
|
|
TrustedPrivateChat = "trusted_private_chat",
|
|
|
|
PublicChat = "public_chat",
|
|
|
|
}
|
|
|
|
|
|
|
|
interface Invite3PID {
|
|
|
|
id_server: string;
|
|
|
|
id_access_token?: string; // this gets injected by the js-sdk
|
|
|
|
medium: string;
|
|
|
|
address: string;
|
|
|
|
}
|
|
|
|
|
|
|
|
interface IStateEvent {
|
|
|
|
type: string;
|
|
|
|
state_key?: string; // defaults to an empty string
|
|
|
|
content: object;
|
|
|
|
}
|
|
|
|
|
|
|
|
interface ICreateOpts {
|
|
|
|
visibility?: Visibility;
|
|
|
|
room_alias_name?: string;
|
|
|
|
name?: string;
|
|
|
|
topic?: string;
|
|
|
|
invite?: string[];
|
|
|
|
invite_3pid?: Invite3PID[];
|
|
|
|
room_version?: string;
|
|
|
|
creation_content?: object;
|
|
|
|
initial_state?: IStateEvent[];
|
|
|
|
preset?: Preset;
|
|
|
|
is_direct?: boolean;
|
|
|
|
power_level_content_override?: object;
|
|
|
|
}
|
|
|
|
|
|
|
|
interface IOpts {
|
|
|
|
dmUserId?: string;
|
|
|
|
createOpts?: ICreateOpts;
|
|
|
|
spinner?: boolean;
|
|
|
|
guestAccess?: boolean;
|
|
|
|
encryption?: boolean;
|
|
|
|
inlineErrors?: boolean;
|
|
|
|
andView?: boolean;
|
|
|
|
}
|
|
|
|
|
2016-06-09 01:03:46 +03:00
|
|
|
/**
|
|
|
|
* Create a new room, and switch to it.
|
|
|
|
*
|
|
|
|
* @param {object=} opts parameters for creating the room
|
2016-09-09 21:25:00 +03:00
|
|
|
* @param {string=} opts.dmUserId If specified, make this a DM room for this user and invite them
|
2016-06-09 01:03:46 +03:00
|
|
|
* @param {object=} opts.createOpts set of options to pass to createRoom call.
|
2019-06-14 19:21:07 +03:00
|
|
|
* @param {bool=} opts.spinner True to show a modal spinner while the room is created.
|
|
|
|
* Default: True
|
2020-01-23 16:54:28 +03:00
|
|
|
* @param {bool=} opts.guestAccess Whether to enable guest access.
|
|
|
|
* Default: True
|
2020-01-23 17:05:38 +03:00
|
|
|
* @param {bool=} opts.encryption Whether to enable encryption.
|
|
|
|
* Default: False
|
2020-02-28 03:10:31 +03:00
|
|
|
* @param {bool=} opts.inlineErrors True to raise errors off the promise instead of resolving to null.
|
|
|
|
* Default: False
|
2020-07-03 00:38:11 +03:00
|
|
|
* @param {bool=} opts.andView True to dispatch an action to view the room once it has been created.
|
2017-07-01 16:40:46 +03:00
|
|
|
*
|
|
|
|
* @returns {Promise} which resolves to the room id, or null if the
|
|
|
|
* action was aborted or failed.
|
2016-06-09 01:03:46 +03:00
|
|
|
*/
|
2020-07-03 00:38:11 +03:00
|
|
|
export default function createRoom(opts: IOpts): Promise<string | null> {
|
2016-09-09 21:25:00 +03:00
|
|
|
opts = opts || {};
|
2019-06-14 19:21:07 +03:00
|
|
|
if (opts.spinner === undefined) opts.spinner = true;
|
2020-01-23 16:54:28 +03:00
|
|
|
if (opts.guestAccess === undefined) opts.guestAccess = true;
|
2020-01-23 17:05:38 +03:00
|
|
|
if (opts.encryption === undefined) opts.encryption = false;
|
2016-06-09 01:03:46 +03:00
|
|
|
|
2016-09-09 21:25:00 +03:00
|
|
|
const ErrorDialog = sdk.getComponent("dialogs.ErrorDialog");
|
|
|
|
const Loader = sdk.getComponent("elements.Spinner");
|
2016-06-09 01:03:46 +03:00
|
|
|
|
2016-09-09 21:25:00 +03:00
|
|
|
const client = MatrixClientPeg.get();
|
2016-06-09 01:03:46 +03:00
|
|
|
if (client.isGuest()) {
|
2018-09-05 20:08:49 +03:00
|
|
|
dis.dispatch({action: 'require_registration'});
|
2017-07-12 16:02:00 +03:00
|
|
|
return Promise.resolve(null);
|
2016-06-09 01:03:46 +03:00
|
|
|
}
|
|
|
|
|
2020-07-03 00:38:11 +03:00
|
|
|
const defaultPreset = opts.dmUserId ? Preset.TrustedPrivateChat : Preset.PrivateChat;
|
2016-09-09 21:25:00 +03:00
|
|
|
|
2016-06-09 01:03:46 +03:00
|
|
|
// set some defaults for the creation
|
2016-09-09 21:25:00 +03:00
|
|
|
const createOpts = opts.createOpts || {};
|
|
|
|
createOpts.preset = createOpts.preset || defaultPreset;
|
2020-07-03 00:38:11 +03:00
|
|
|
createOpts.visibility = createOpts.visibility || Visibility.Private;
|
2016-09-09 21:25:00 +03:00
|
|
|
if (opts.dmUserId && createOpts.invite === undefined) {
|
2018-01-25 12:54:31 +03:00
|
|
|
switch (getAddressType(opts.dmUserId)) {
|
|
|
|
case 'mx-user-id':
|
|
|
|
createOpts.invite = [opts.dmUserId];
|
|
|
|
break;
|
|
|
|
case 'email':
|
|
|
|
createOpts.invite_3pid = [{
|
|
|
|
id_server: MatrixClientPeg.get().getIdentityServerUrl(true),
|
|
|
|
medium: 'email',
|
|
|
|
address: opts.dmUserId,
|
|
|
|
}];
|
|
|
|
}
|
2016-09-09 21:25:00 +03:00
|
|
|
}
|
2016-09-12 20:32:44 +03:00
|
|
|
if (opts.dmUserId && createOpts.is_direct === undefined) {
|
|
|
|
createOpts.is_direct = true;
|
|
|
|
}
|
2016-06-09 01:03:46 +03:00
|
|
|
|
2017-05-24 18:56:13 +03:00
|
|
|
// By default, view the room after creating it
|
|
|
|
if (opts.andView === undefined) {
|
|
|
|
opts.andView = true;
|
|
|
|
}
|
|
|
|
|
2020-01-23 17:05:38 +03:00
|
|
|
createOpts.initial_state = createOpts.initial_state || [];
|
|
|
|
|
2016-06-09 01:03:46 +03:00
|
|
|
// Allow guests by default since the room is private and they'd
|
|
|
|
// need an invite. This means clicking on a 3pid invite email can
|
|
|
|
// actually drop you right in to a chat.
|
2020-01-23 16:54:28 +03:00
|
|
|
if (opts.guestAccess) {
|
|
|
|
createOpts.initial_state.push({
|
2020-01-23 17:05:38 +03:00
|
|
|
type: 'm.room.guest_access',
|
|
|
|
state_key: '',
|
2016-06-09 01:03:46 +03:00
|
|
|
content: {
|
2017-07-01 16:40:46 +03:00
|
|
|
guest_access: 'can_join',
|
2016-06-09 01:03:46 +03:00
|
|
|
},
|
2020-01-23 17:05:38 +03:00
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
if (opts.encryption) {
|
|
|
|
createOpts.initial_state.push({
|
|
|
|
type: 'm.room.encryption',
|
2016-06-09 01:03:46 +03:00
|
|
|
state_key: '',
|
2020-01-23 17:05:38 +03:00
|
|
|
content: {
|
|
|
|
algorithm: 'm.megolm.v1.aes-sha2',
|
|
|
|
},
|
2020-01-23 16:54:28 +03:00
|
|
|
});
|
|
|
|
}
|
2016-06-09 01:03:46 +03:00
|
|
|
|
2019-06-14 19:21:07 +03:00
|
|
|
let modal;
|
|
|
|
if (opts.spinner) modal = Modal.createDialog(Loader, null, 'mx_Dialog_spinner');
|
2016-06-09 01:03:46 +03:00
|
|
|
|
2016-09-09 21:25:00 +03:00
|
|
|
let roomId;
|
2016-06-09 01:03:46 +03:00
|
|
|
return client.createRoom(createOpts).finally(function() {
|
2019-06-14 19:21:07 +03:00
|
|
|
if (modal) modal.close();
|
2016-06-09 01:03:46 +03:00
|
|
|
}).then(function(res) {
|
2016-09-09 21:25:00 +03:00
|
|
|
roomId = res.room_id;
|
|
|
|
if (opts.dmUserId) {
|
|
|
|
return Rooms.setDMRoom(roomId, opts.dmUserId);
|
|
|
|
} else {
|
2017-07-12 16:02:00 +03:00
|
|
|
return Promise.resolve();
|
2016-09-09 21:25:00 +03:00
|
|
|
}
|
|
|
|
}).then(function() {
|
2016-07-17 20:32:48 +03:00
|
|
|
// NB createRoom doesn't block on the client seeing the echo that the
|
|
|
|
// room has been created, so we race here with the client knowing that
|
|
|
|
// the room exists, causing things like
|
|
|
|
// https://github.com/vector-im/vector-web/issues/1813
|
2017-05-24 18:56:13 +03:00
|
|
|
if (opts.andView) {
|
|
|
|
dis.dispatch({
|
|
|
|
action: 'view_room',
|
|
|
|
room_id: roomId,
|
2017-06-16 20:24:07 +03:00
|
|
|
should_peek: false,
|
2017-09-15 00:22:21 +03:00
|
|
|
// Creating a room will have joined us to the room,
|
|
|
|
// so we are expecting the room to come down the sync
|
|
|
|
// stream, if it hasn't already.
|
|
|
|
joining: true,
|
2017-05-24 18:56:13 +03:00
|
|
|
});
|
|
|
|
}
|
2016-09-09 21:25:00 +03:00
|
|
|
return roomId;
|
2016-06-09 01:03:46 +03:00
|
|
|
}, function(err) {
|
2020-02-28 03:10:31 +03:00
|
|
|
// Raise the error if the caller requested that we do so.
|
|
|
|
if (opts.inlineErrors) throw err;
|
|
|
|
|
2017-07-06 19:40:27 +03:00
|
|
|
// We also failed to join the room (this sets joining to false in RoomViewStore)
|
|
|
|
dis.dispatch({
|
|
|
|
action: 'join_room_error',
|
|
|
|
});
|
2017-03-13 01:59:41 +03:00
|
|
|
console.error("Failed to create room " + roomId + " " + err);
|
2019-04-10 04:03:38 +03:00
|
|
|
let description = _t("Server may be unavailable, overloaded, or you hit a bug.");
|
|
|
|
if (err.errcode === "M_UNSUPPORTED_ROOM_VERSION") {
|
|
|
|
// Technically not possible with the UI as of April 2019 because there's no
|
|
|
|
// options for the user to change this. However, it's not a bad thing to report
|
|
|
|
// the error to the user for if/when the UI is available.
|
|
|
|
description = _t("The server does not support the room version specified.");
|
|
|
|
}
|
2017-08-10 17:17:52 +03:00
|
|
|
Modal.createTrackedDialog('Failure to create room', '', ErrorDialog, {
|
2017-05-23 17:16:31 +03:00
|
|
|
title: _t("Failure to create room"),
|
2019-04-10 04:03:38 +03:00
|
|
|
description,
|
2016-06-09 01:03:46 +03:00
|
|
|
});
|
|
|
|
return null;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2020-07-03 00:38:11 +03:00
|
|
|
export function findDMForUser(client: MatrixClient, userId: string): Room {
|
2019-12-19 19:43:10 +03:00
|
|
|
const roomIds = DMRoomMap.shared().getDMRoomsForUserId(userId);
|
|
|
|
const rooms = roomIds.map(id => client.getRoom(id));
|
|
|
|
const suitableDMRooms = rooms.filter(r => {
|
|
|
|
if (r && r.getMyMembership() === "join") {
|
|
|
|
const member = r.getMember(userId);
|
|
|
|
return member && (member.membership === "invite" || member.membership === "join");
|
|
|
|
}
|
|
|
|
return false;
|
2020-03-26 19:45:59 +03:00
|
|
|
}).sort((r1, r2) => {
|
|
|
|
return r2.getLastActiveTimestamp() -
|
|
|
|
r1.getLastActiveTimestamp();
|
2019-12-19 19:43:10 +03:00
|
|
|
});
|
|
|
|
if (suitableDMRooms.length) {
|
2020-02-13 16:34:44 +03:00
|
|
|
return suitableDMRooms[0];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-13 17:13:10 +03:00
|
|
|
/*
|
|
|
|
* Try to ensure the user is already in the megolm session before continuing
|
|
|
|
* NOTE: this assumes you've just created the room and there's not been an opportunity
|
|
|
|
* for other code to run, so we shouldn't miss RoomState.newMember when it comes by.
|
|
|
|
*/
|
2020-07-03 00:38:11 +03:00
|
|
|
export async function _waitForMember(client: MatrixClient, roomId: string, userId: string, opts = { timeout: 1500 }) {
|
2020-02-13 17:13:10 +03:00
|
|
|
const { timeout } = opts;
|
|
|
|
let handler;
|
|
|
|
return new Promise((resolve) => {
|
|
|
|
handler = function(_event, _roomstate, member) {
|
|
|
|
if (member.userId !== userId) return;
|
|
|
|
if (member.roomId !== roomId) return;
|
|
|
|
resolve(true);
|
|
|
|
};
|
|
|
|
client.on("RoomState.newMember", handler);
|
|
|
|
|
|
|
|
/* We don't want to hang if this goes wrong, so we proceed and hope the other
|
|
|
|
user is already in the megolm session */
|
|
|
|
setTimeout(resolve, timeout, false);
|
|
|
|
}).finally(() => {
|
|
|
|
client.removeListener("RoomState.newMember", handler);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2020-02-18 14:25:19 +03:00
|
|
|
/*
|
|
|
|
* Ensure that for every user in a room, there is at least one device that we
|
|
|
|
* can encrypt to.
|
|
|
|
*/
|
2020-07-03 00:38:11 +03:00
|
|
|
export async function canEncryptToAllUsers(client: MatrixClient, userIds: string[]) {
|
2020-05-08 18:36:13 +03:00
|
|
|
const usersDeviceMap = await client.downloadKeys(userIds);
|
2020-02-18 14:25:19 +03:00
|
|
|
// { "@user:host": { "DEVICE": {...}, ... }, ... }
|
|
|
|
return Object.values(usersDeviceMap).every((userDevices) =>
|
|
|
|
// { "DEVICE": {...}, ... }
|
|
|
|
Object.keys(userDevices).length > 0,
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2020-07-03 00:38:11 +03:00
|
|
|
export async function ensureDMExists(client: MatrixClient, userId: string): Promise<string> {
|
2020-02-13 16:34:44 +03:00
|
|
|
const existingDMRoom = findDMForUser(client, userId);
|
|
|
|
let roomId;
|
|
|
|
if (existingDMRoom) {
|
|
|
|
roomId = existingDMRoom.roomId;
|
2019-12-19 19:43:10 +03:00
|
|
|
} else {
|
2020-02-13 17:13:10 +03:00
|
|
|
let encryption;
|
2020-05-19 13:36:44 +03:00
|
|
|
if (privateShouldBeEncrypted()) {
|
2020-02-18 14:25:19 +03:00
|
|
|
encryption = canEncryptToAllUsers(client, [userId]);
|
2020-02-13 17:13:10 +03:00
|
|
|
}
|
|
|
|
roomId = await createRoom({encryption, dmUserId: userId, spinner: false, andView: false});
|
|
|
|
await _waitForMember(client, roomId, userId);
|
2019-12-19 19:43:10 +03:00
|
|
|
}
|
|
|
|
return roomId;
|
|
|
|
}
|
2020-05-19 13:36:44 +03:00
|
|
|
|
2020-08-14 15:27:12 +03:00
|
|
|
export function privateShouldBeEncrypted(): boolean {
|
|
|
|
const e2eeWellKnown = getE2EEWellKnown();
|
|
|
|
if (e2eeWellKnown) {
|
|
|
|
const defaultDisabled = e2eeWellKnown["default"] === false;
|
2020-08-14 15:01:43 +03:00
|
|
|
return !defaultDisabled;
|
|
|
|
}
|
2020-06-02 00:37:12 +03:00
|
|
|
return true;
|
2020-05-19 13:36:44 +03:00
|
|
|
}
|