Revision control

Copy as Markdown

Other Tools

"use strict";
Object.defineProperty(exports, "__esModule", {
value: true
});
exports.SecretStorage = void 0;
var _secretStorage = require("../secret-storage");
var _SecretSharing = require("./SecretSharing");
function _defineProperty(e, r, t) { return (r = _toPropertyKey(r)) in e ? Object.defineProperty(e, r, { value: t, enumerable: !0, configurable: !0, writable: !0 }) : e[r] = t, e; }
function _toPropertyKey(t) { var i = _toPrimitive(t, "string"); return "symbol" == typeof i ? i : i + ""; }
function _toPrimitive(t, r) { if ("object" != typeof t || !t) return t; var e = t[Symbol.toPrimitive]; if (void 0 !== e) { var i = e.call(t, r || "default"); if ("object" != typeof i) return i; throw new TypeError("@@toPrimitive must return a primitive value."); } return ("string" === r ? String : Number)(t); } /*
Copyright 2019 - 2021 The Matrix.org Foundation C.I.C.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
/* re-exports for backwards compatibility */
/**
* Implements Secure Secret Storage and Sharing (MSC1946)
*
* @deprecated This is just a backwards-compatibility hack which will be removed soon.
* Use {@link SecretStorage.ServerSideSecretStorageImpl} from `../secret-storage` and/or {@link SecretSharing} from `./SecretSharing`.
*/
class SecretStorage {
// In its pure javascript days, this was relying on some proper Javascript-style
// type-abuse where sometimes we'd pass in a fake client object with just the account
// data methods implemented, which is all this class needs unless you use the secret
// sharing code, so it was fine. As a low-touch TypeScript migration, we added
// an extra, optional param for a real matrix client, so you can not pass it as long
// as you don't request any secrets.
//
// Nowadays, the whole class is scheduled for destruction, once we get rid of the legacy
// Crypto impl that exposes it.
constructor(accountDataAdapter, cryptoCallbacks, baseApis) {
_defineProperty(this, "storageImpl", void 0);
_defineProperty(this, "sharingImpl", void 0);
this.storageImpl = new _secretStorage.ServerSideSecretStorageImpl(accountDataAdapter, cryptoCallbacks);
this.sharingImpl = new _SecretSharing.SecretSharing(baseApis, cryptoCallbacks);
}
getDefaultKeyId() {
return this.storageImpl.getDefaultKeyId();
}
setDefaultKeyId(keyId) {
return this.storageImpl.setDefaultKeyId(keyId);
}
/**
* Add a key for encrypting secrets.
*/
addKey(algorithm, opts, keyId) {
return this.storageImpl.addKey(algorithm, opts, keyId);
}
/**
* Get the key information for a given ID.
*/
getKey(keyId) {
return this.storageImpl.getKey(keyId);
}
/**
* Check whether we have a key with a given ID.
*/
hasKey(keyId) {
return this.storageImpl.hasKey(keyId);
}
/**
* Check whether a key matches what we expect based on the key info
*/
checkKey(key, info) {
return this.storageImpl.checkKey(key, info);
}
/**
* Store an encrypted secret on the server
*/
store(name, secret, keys) {
return this.storageImpl.store(name, secret, keys);
}
/**
* Get a secret from storage.
*/
get(name) {
return this.storageImpl.get(name);
}
/**
* Check if a secret is stored on the server.
*/
async isStored(name) {
return this.storageImpl.isStored(name);
}
/**
* Request a secret from another device
*/
request(name, devices) {
return this.sharingImpl.request(name, devices);
}
onRequestReceived(event) {
return this.sharingImpl.onRequestReceived(event);
}
onSecretReceived(event) {
this.sharingImpl.onSecretReceived(event);
}
}
exports.SecretStorage = SecretStorage;