hydrogen-web/src/matrix/Session.js

314 lines
11 KiB
JavaScript
Raw Normal View History

2020-08-05 22:08:55 +05:30
/*
Copyright 2020 Bruno Windels <bruno@windels.cloud>
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
import {Room} from "./room/Room.js";
2019-02-27 01:19:45 +05:30
import { ObservableMap } from "../observable/index.js";
import { SendScheduler, RateLimitingBackoff } from "./SendScheduler.js";
import {User} from "./User.js";
import {Account as E2EEAccount} from "./e2ee/Account.js";
import {DeviceMessageHandler} from "./DeviceMessageHandler.js";
import {Decryption as OlmDecryption} from "./e2ee/olm/Decryption.js";
import {Decryption as MegOlmDecryption} from "./e2ee/megolm/Decryption.js";
2020-08-31 17:43:21 +05:30
import {DeviceTracker} from "./e2ee/DeviceTracker.js";
const PICKLE_KEY = "DEFAULT_KEY";
2019-02-11 01:55:29 +05:30
export class Session {
// sessionInfo contains deviceId, userId and homeServer
2020-09-02 18:29:17 +05:30
constructor({clock, storage, hsApi, sessionInfo, olm}) {
this._clock = clock;
2019-05-12 23:56:46 +05:30
this._storage = storage;
this._hsApi = hsApi;
this._syncInfo = null;
this._sessionInfo = sessionInfo;
2019-05-12 23:56:46 +05:30
this._rooms = new ObservableMap();
this._sendScheduler = new SendScheduler({hsApi, backoff: new RateLimitingBackoff()});
2019-02-24 23:55:06 +05:30
this._roomUpdateCallback = (room, params) => this._rooms.update(room.id, params);
this._user = new User(sessionInfo.userId);
2020-09-02 18:29:17 +05:30
this._deviceMessageHandler = new DeviceMessageHandler({storage});
2020-08-27 16:54:55 +05:30
this._olm = olm;
this._olmUtil = null;
this._e2eeAccount = null;
this._deviceTracker = null;
if (olm) {
this._olmUtil = new olm.Utility();
this._deviceTracker = new DeviceTracker({
storage,
getSyncToken: () => this.syncToken,
olmUtil: this._olmUtil,
});
}
}
// called once this._e2eeAccount is assigned
_setupEncryption() {
const olmDecryption = new OlmDecryption({
account: this._e2eeAccount,
pickleKey: PICKLE_KEY,
now: this._clock.now,
ownUserId: this._user.id,
storage: this._storage,
olm: this._olm,
});
2020-09-02 18:22:19 +05:30
const megolmDecryption = new MegOlmDecryption({pickleKey: PICKLE_KEY, olm: this._olm});
this._deviceMessageHandler.enableEncryption({olmDecryption, megolmDecryption});
}
// called after load
async beforeFirstSync(isNewLogin) {
if (this._olm) {
if (isNewLogin && this._e2eeAccount) {
throw new Error("there should not be an e2ee account already on a fresh login");
}
if (!this._e2eeAccount) {
const txn = await this._storage.readWriteTxn([
this._storage.storeNames.session
]);
try {
this._e2eeAccount = await E2EEAccount.create({
hsApi: this._hsApi,
olm: this._olm,
pickleKey: PICKLE_KEY,
userId: this._sessionInfo.userId,
deviceId: this._sessionInfo.deviceId,
txn
});
} catch (err) {
txn.abort();
throw err;
}
await txn.complete();
this._setupEncryption();
}
await this._e2eeAccount.generateOTKsIfNeeded(this._storage);
2020-08-27 22:43:24 +05:30
await this._e2eeAccount.uploadKeys(this._storage);
await this._deviceMessageHandler.decryptPending();
}
2019-05-12 23:56:46 +05:30
}
2018-12-21 19:05:24 +05:30
2019-05-12 23:56:46 +05:30
async load() {
const txn = await this._storage.readTxn([
this._storage.storeNames.session,
this._storage.storeNames.roomSummary,
this._storage.storeNames.roomMembers,
2019-05-12 23:56:46 +05:30
this._storage.storeNames.timelineEvents,
2019-05-20 00:19:46 +05:30
this._storage.storeNames.timelineFragments,
this._storage.storeNames.pendingEvents,
2019-05-12 23:56:46 +05:30
]);
// restore session object
this._syncInfo = await txn.session.get("sync");
// restore e2ee account, if any
if (this._olm) {
this._e2eeAccount = await E2EEAccount.load({
hsApi: this._hsApi,
olm: this._olm,
pickleKey: PICKLE_KEY,
userId: this._sessionInfo.userId,
deviceId: this._sessionInfo.deviceId,
txn
});
if (this._e2eeAccount) {
this._setupEncryption();
}
}
const pendingEventsByRoomId = await this._getPendingEventsByRoom(txn);
2019-05-12 23:56:46 +05:30
// load rooms
const rooms = await txn.roomSummary.getAll();
await Promise.all(rooms.map(summary => {
const room = this.createRoom(summary.roomId, pendingEventsByRoomId.get(summary.roomId));
2019-05-12 23:56:46 +05:30
return room.load(summary, txn);
}));
}
2018-12-21 19:05:24 +05:30
get isStarted() {
return this._sendScheduler.isStarted;
}
2020-04-18 22:46:16 +05:30
stop() {
this._sendScheduler.stop();
}
async start(lastVersionResponse) {
if (lastVersionResponse) {
// store /versions response
const txn = await this._storage.readWriteTxn([
this._storage.storeNames.session
]);
txn.session.set("serverVersions", lastVersionResponse);
// TODO: what can we do if this throws?
await txn.complete();
}
this._sendScheduler.start();
for (const [, room] of this._rooms) {
2019-07-27 02:10:39 +05:30
room.resumeSending();
}
}
async _getPendingEventsByRoom(txn) {
const pendingEvents = await txn.pendingEvents.getAll();
return pendingEvents.reduce((groups, pe) => {
const group = groups.get(pe.roomId);
if (group) {
group.push(pe);
} else {
groups.set(pe.roomId, [pe]);
}
return groups;
}, new Map());
}
2019-02-21 04:18:16 +05:30
get rooms() {
return this._rooms;
}
createRoom(roomId, pendingEvents) {
2019-05-12 23:56:46 +05:30
const room = new Room({
roomId,
storage: this._storage,
emitCollectionChange: this._roomUpdateCallback,
hsApi: this._hsApi,
sendScheduler: this._sendScheduler,
pendingEvents,
user: this._user,
});
2019-05-12 23:56:46 +05:30
this._rooms.add(roomId, room);
return room;
}
2018-12-21 19:05:24 +05:30
2020-08-31 17:43:21 +05:30
async writeSync(syncResponse, syncFilterId, roomChanges, txn) {
2020-08-28 17:26:44 +05:30
const changes = {};
const syncToken = syncResponse.next_batch;
const deviceOneTimeKeysCount = syncResponse.device_one_time_keys_count;
if (this._e2eeAccount && deviceOneTimeKeysCount) {
changes.e2eeAccountChanges = this._e2eeAccount.writeSync(deviceOneTimeKeysCount, txn);
}
if (syncToken !== this.syncToken) {
const syncInfo = {token: syncToken, filterId: syncFilterId};
// don't modify `this` because transaction might still fail
txn.session.set("sync", syncInfo);
2020-08-28 17:26:44 +05:30
changes.syncInfo = syncInfo;
}
2020-08-31 17:43:21 +05:30
if (this._deviceTracker) {
for (const {room, changes} of roomChanges) {
// TODO: move this so the room passes this to it's "encryption" object in its own writeSync method?
2020-08-31 17:43:21 +05:30
if (room.isTrackingMembers && changes.memberChanges?.size) {
await this._deviceTracker.writeMemberChanges(room, changes.memberChanges, txn);
}
}
const deviceLists = syncResponse.device_lists;
if (deviceLists) {
await this._deviceTracker.writeDeviceChanges(deviceLists, txn);
}
2020-08-31 17:43:21 +05:30
}
const toDeviceEvents = syncResponse.to_device?.events;
if (Array.isArray(toDeviceEvents)) {
this._deviceMessageHandler.writeSync(toDeviceEvents, txn);
}
2020-08-28 17:26:44 +05:30
return changes;
}
2020-08-28 17:26:44 +05:30
afterSync({syncInfo, e2eeAccountChanges}) {
if (syncInfo) {
// sync transaction succeeded, modify object state now
this._syncInfo = syncInfo;
2019-05-12 23:56:46 +05:30
}
2020-08-28 17:26:44 +05:30
if (this._e2eeAccount && e2eeAccountChanges) {
this._e2eeAccount.afterSync(e2eeAccountChanges);
}
2019-05-12 23:56:46 +05:30
}
2019-02-07 05:50:27 +05:30
async afterSyncCompleted() {
const needsToUploadOTKs = await this._e2eeAccount.generateOTKsIfNeeded(this._storage);
const promises = [this._deviceMessageHandler.decryptPending()];
if (needsToUploadOTKs) {
// TODO: we could do this in parallel with sync if it proves to be too slow
// but I'm not sure how to not swallow errors in that case
promises.push(this._e2eeAccount.uploadKeys(this._storage));
}
// run key upload and decryption in parallel
await Promise.all(promises);
}
2019-05-12 23:56:46 +05:30
get syncToken() {
return this._syncInfo?.token;
2019-05-12 23:56:46 +05:30
}
2019-06-16 14:23:23 +05:30
2019-10-12 23:54:09 +05:30
get syncFilterId() {
return this._syncInfo?.filterId;
2019-10-12 23:54:09 +05:30
}
get user() {
return this._user;
2019-06-16 14:23:23 +05:30
}
2019-02-21 04:18:16 +05:30
}
export function tests() {
2020-03-15 02:08:37 +05:30
function createStorageMock(session, pendingEvents = []) {
return {
readTxn() {
return Promise.resolve({
session: {
get(key) {
return Promise.resolve(session[key]);
}
},
pendingEvents: {
getAll() {
return Promise.resolve(pendingEvents);
}
2020-03-15 02:08:37 +05:30
},
roomSummary: {
getAll() {
return Promise.resolve([]);
}
}
});
2020-03-15 02:08:37 +05:30
},
storeNames: {}
};
}
return {
"session data is not modified until after sync": async (assert) => {
const session = new Session({storage: createStorageMock({
sync: {token: "a", filterId: 5}
2020-03-15 02:08:37 +05:30
}), sessionInfo: {userId: ""}});
await session.load();
let syncSet = false;
const syncTxn = {
session: {
set(key, value) {
if (key === "sync") {
assert.equal(value.token, "b");
assert.equal(value.filterId, 6);
syncSet = true;
}
}
}
};
2020-09-03 15:01:00 +05:30
const newSessionData = await session.writeSync({next_batch: "b"}, 6, {}, syncTxn);
assert(syncSet);
2020-03-15 02:08:37 +05:30
assert.equal(session.syncToken, "a");
assert.equal(session.syncFilterId, 5);
session.afterSync(newSessionData);
2020-03-15 02:08:37 +05:30
assert.equal(session.syncToken, "b");
assert.equal(session.syncFilterId, 6);
}
}
}