2020-08-05 18:38:55 +02:00
|
|
|
/*
|
|
|
|
Copyright 2020 Bruno Windels <bruno@windels.cloud>
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2021-05-07 16:13:49 +02:00
|
|
|
import {BaseRoom} from "./BaseRoom.js";
|
2020-04-20 21:26:39 +02:00
|
|
|
import {SyncWriter} from "./timeline/persistence/SyncWriter.js";
|
2021-06-03 16:42:09 +02:00
|
|
|
import {MemberWriter} from "./timeline/persistence/MemberWriter.js";
|
|
|
|
import {RelationWriter} from "./timeline/persistence/RelationWriter.js";
|
2020-04-20 21:26:39 +02:00
|
|
|
import {SendQueue} from "./sending/SendQueue.js";
|
2020-08-17 10:48:00 +02:00
|
|
|
import {WrappedError} from "../error.js"
|
2020-08-21 18:11:07 +02:00
|
|
|
import {Heroes} from "./members/Heroes.js";
|
2020-11-11 10:47:55 +01:00
|
|
|
import {AttachmentUpload} from "./AttachmentUpload.js";
|
2020-09-10 12:09:17 +02:00
|
|
|
import {DecryptionSource} from "../e2ee/common.js";
|
2020-11-11 10:47:55 +01:00
|
|
|
|
2020-09-10 12:09:17 +02:00
|
|
|
const EVENT_ENCRYPTED_TYPE = "m.room.encrypted";
|
2018-12-21 14:35:24 +01:00
|
|
|
|
2021-05-07 16:13:49 +02:00
|
|
|
export class Room extends BaseRoom {
|
|
|
|
constructor(options) {
|
|
|
|
super(options);
|
|
|
|
const {pendingEvents} = options;
|
2021-06-03 16:42:09 +02:00
|
|
|
const relationWriter = new RelationWriter({
|
|
|
|
roomId: this.id,
|
|
|
|
fragmentIdComparer: this._fragmentIdComparer,
|
|
|
|
ownUserId: this._user.id
|
|
|
|
});
|
|
|
|
this._syncWriter = new SyncWriter({
|
|
|
|
roomId: this.id,
|
|
|
|
fragmentIdComparer: this._fragmentIdComparer,
|
|
|
|
relationWriter,
|
|
|
|
memberWriter: new MemberWriter(this.id)
|
|
|
|
});
|
2021-05-07 16:13:49 +02:00
|
|
|
this._sendQueue = new SendQueue({roomId: this.id, storage: this._storage, hsApi: this._hsApi, pendingEvents});
|
2020-09-04 12:10:12 +02:00
|
|
|
}
|
|
|
|
|
2020-09-23 14:26:14 +02:00
|
|
|
_setEncryption(roomEncryption) {
|
2021-05-07 16:13:49 +02:00
|
|
|
if (super._setEncryption(roomEncryption)) {
|
2020-09-04 15:28:22 +02:00
|
|
|
this._sendQueue.enableEncryption(this._roomEncryption);
|
2021-05-07 16:13:49 +02:00
|
|
|
return true;
|
2020-09-04 15:28:22 +02:00
|
|
|
}
|
2021-05-07 16:13:49 +02:00
|
|
|
return false;
|
2021-03-03 11:27:55 +01:00
|
|
|
}
|
|
|
|
|
2021-04-20 17:39:46 +02:00
|
|
|
async prepareSync(roomResponse, membership, invite, newKeys, txn, log) {
|
2021-02-17 18:45:04 +01:00
|
|
|
log.set("id", this.id);
|
2021-03-01 15:04:45 +01:00
|
|
|
if (newKeys) {
|
|
|
|
log.set("newKeys", newKeys.length);
|
|
|
|
}
|
2021-05-10 18:42:30 +02:00
|
|
|
let summaryChanges = this._summary.data.applySyncResponse(roomResponse, membership);
|
2021-04-23 18:05:46 +02:00
|
|
|
if (membership === "join" && invite) {
|
2021-04-20 17:39:46 +02:00
|
|
|
summaryChanges = summaryChanges.applyInvite(invite);
|
|
|
|
}
|
2020-09-23 14:26:14 +02:00
|
|
|
let roomEncryption = this._roomEncryption;
|
|
|
|
// encryption is enabled in this sync
|
|
|
|
if (!roomEncryption && summaryChanges.encryption) {
|
2021-02-17 18:45:04 +01:00
|
|
|
log.set("enableEncryption", true);
|
2020-09-23 14:26:14 +02:00
|
|
|
roomEncryption = this._createRoomEncryption(this, summaryChanges.encryption);
|
|
|
|
}
|
2020-09-10 12:11:43 +02:00
|
|
|
|
2021-03-01 22:30:33 +01:00
|
|
|
let retryEntries;
|
2020-09-23 14:26:14 +02:00
|
|
|
let decryptPreparation;
|
|
|
|
if (roomEncryption) {
|
2021-03-03 13:53:52 +01:00
|
|
|
let eventsToDecrypt = roomResponse?.timeline?.events || [];
|
|
|
|
// when new keys arrive, also see if any older events can now be retried to decrypt
|
|
|
|
if (newKeys) {
|
2021-03-05 11:50:54 +01:00
|
|
|
retryEntries = await this._getSyncRetryDecryptEntries(newKeys, roomEncryption, txn);
|
2021-03-03 13:53:52 +01:00
|
|
|
if (retryEntries.length) {
|
|
|
|
log.set("retry", retryEntries.length);
|
|
|
|
eventsToDecrypt = eventsToDecrypt.concat(retryEntries.map(entry => entry.event));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
eventsToDecrypt = eventsToDecrypt.filter(event => {
|
|
|
|
return event?.type === EVENT_ENCRYPTED_TYPE;
|
|
|
|
});
|
|
|
|
if (eventsToDecrypt.length) {
|
|
|
|
decryptPreparation = await roomEncryption.prepareDecryptAll(
|
|
|
|
eventsToDecrypt, newKeys, DecryptionSource.Sync, txn);
|
|
|
|
}
|
2020-09-04 15:28:22 +02:00
|
|
|
}
|
2020-09-23 14:26:14 +02:00
|
|
|
|
|
|
|
return {
|
|
|
|
roomEncryption,
|
|
|
|
summaryChanges,
|
|
|
|
decryptPreparation,
|
|
|
|
decryptChanges: null,
|
2021-03-01 22:30:33 +01:00
|
|
|
retryEntries
|
2020-09-23 14:26:14 +02:00
|
|
|
};
|
2020-09-04 15:28:22 +02:00
|
|
|
}
|
|
|
|
|
2021-02-17 18:45:04 +01:00
|
|
|
async afterPrepareSync(preparation, parentLog) {
|
2020-09-23 14:26:14 +02:00
|
|
|
if (preparation.decryptPreparation) {
|
2021-03-02 15:29:35 +01:00
|
|
|
await parentLog.wrap("decrypt", async log => {
|
2021-02-17 18:45:04 +01:00
|
|
|
log.set("id", this.id);
|
|
|
|
preparation.decryptChanges = await preparation.decryptPreparation.decrypt();
|
|
|
|
preparation.decryptPreparation = null;
|
2021-02-18 12:39:29 +01:00
|
|
|
}, parentLog.level.Detail);
|
2020-09-10 12:11:43 +02:00
|
|
|
}
|
2020-09-04 12:09:19 +02:00
|
|
|
}
|
|
|
|
|
2020-08-19 16:58:28 +02:00
|
|
|
/** @package */
|
2021-03-01 22:30:33 +01:00
|
|
|
async writeSync(roomResponse, isInitialSync, {summaryChanges, decryptChanges, roomEncryption, retryEntries}, txn, log) {
|
2021-02-17 18:45:04 +01:00
|
|
|
log.set("id", this.id);
|
2021-05-06 15:26:48 +02:00
|
|
|
const isRejoin = summaryChanges.isNewJoin(this._summary.data);
|
2021-05-05 17:03:22 +02:00
|
|
|
if (isRejoin) {
|
2021-05-05 19:04:26 +02:00
|
|
|
// remove all room state before calling syncWriter,
|
|
|
|
// so no old state sticks around
|
|
|
|
txn.roomState.removeAllForRoom(this.id);
|
2021-05-06 15:27:10 +02:00
|
|
|
txn.roomMembers.removeAllForRoom(this.id);
|
2021-05-05 17:03:22 +02:00
|
|
|
}
|
2021-05-20 10:01:30 +02:00
|
|
|
const {entries: newEntries, updatedEntries, newLiveKey, memberChanges} =
|
2021-04-22 17:21:29 +02:00
|
|
|
await log.wrap("syncWriter", log => this._syncWriter.writeSync(roomResponse, isRejoin, txn, log), log.level.Detail);
|
2020-09-23 14:26:14 +02:00
|
|
|
if (decryptChanges) {
|
2021-03-15 12:56:40 +01:00
|
|
|
const decryption = await log.wrap("decryptChanges", log => decryptChanges.write(txn, log));
|
2021-03-02 21:29:32 +01:00
|
|
|
log.set("decryptionResults", decryption.results.size);
|
|
|
|
log.set("decryptionErrors", decryption.errors.size);
|
2021-03-01 23:14:14 +01:00
|
|
|
if (this._isTimelineOpen) {
|
|
|
|
await decryption.verifySenders(txn);
|
|
|
|
}
|
2021-03-03 11:27:18 +01:00
|
|
|
decryption.applyToEntries(newEntries);
|
2021-03-01 22:30:33 +01:00
|
|
|
if (retryEntries?.length) {
|
2021-03-03 11:27:18 +01:00
|
|
|
decryption.applyToEntries(retryEntries);
|
2021-05-20 10:01:30 +02:00
|
|
|
updatedEntries.push(...retryEntries);
|
2021-03-01 22:30:33 +01:00
|
|
|
}
|
2020-09-10 12:11:43 +02:00
|
|
|
}
|
2021-05-20 10:01:30 +02:00
|
|
|
log.set("newEntries", newEntries.length);
|
|
|
|
log.set("updatedEntries", updatedEntries.length);
|
2021-03-02 19:14:29 +01:00
|
|
|
let shouldFlushKeyShares = false;
|
2020-09-10 12:11:43 +02:00
|
|
|
// pass member changes to device tracker
|
2020-09-23 14:26:14 +02:00
|
|
|
if (roomEncryption && this.isTrackingMembers && memberChanges?.size) {
|
2021-03-03 11:51:50 +01:00
|
|
|
shouldFlushKeyShares = await roomEncryption.writeMemberChanges(memberChanges, txn, log);
|
2021-03-02 19:14:29 +01:00
|
|
|
log.set("shouldFlushKeyShares", shouldFlushKeyShares);
|
2020-09-10 12:11:43 +02:00
|
|
|
}
|
2021-05-20 10:01:30 +02:00
|
|
|
const allEntries = newEntries.concat(updatedEntries);
|
2020-09-23 14:26:14 +02:00
|
|
|
// also apply (decrypted) timeline entries to the summary changes
|
|
|
|
summaryChanges = summaryChanges.applyTimelineEntries(
|
2021-03-03 11:27:18 +01:00
|
|
|
allEntries, isInitialSync, !this._isTimelineOpen, this._user.id);
|
2021-05-06 15:26:48 +02:00
|
|
|
|
2021-05-10 18:42:30 +02:00
|
|
|
// if we've have left the room, remove the summary
|
|
|
|
if (summaryChanges.membership !== "join") {
|
2021-05-06 15:26:48 +02:00
|
|
|
txn.roomSummary.remove(this.id);
|
2021-05-05 17:03:22 +02:00
|
|
|
} else {
|
|
|
|
// write summary changes, and unset if nothing was actually changed
|
|
|
|
summaryChanges = this._summary.writeData(summaryChanges, txn);
|
|
|
|
}
|
2021-03-02 21:29:32 +01:00
|
|
|
if (summaryChanges) {
|
|
|
|
log.set("summaryChanges", summaryChanges.diff(this._summary.data));
|
|
|
|
}
|
2020-08-21 18:11:07 +02:00
|
|
|
// fetch new members while we have txn open,
|
|
|
|
// but don't make any in-memory changes yet
|
|
|
|
let heroChanges;
|
2021-03-05 17:04:18 +01:00
|
|
|
// if any hero changes their display name, the summary in the room response
|
|
|
|
// is also updated, which will trigger a RoomSummary update
|
|
|
|
// and make summaryChanges non-falsy here
|
2020-09-23 14:26:14 +02:00
|
|
|
if (summaryChanges?.needsHeroes) {
|
2020-08-21 19:03:21 +02:00
|
|
|
// room name disappeared, open heroes
|
|
|
|
if (!this._heroes) {
|
|
|
|
this._heroes = new Heroes(this._roomId);
|
|
|
|
}
|
2020-08-31 09:50:57 +02:00
|
|
|
heroChanges = await this._heroes.calculateChanges(summaryChanges.heroes, memberChanges, txn);
|
2020-08-21 18:11:07 +02:00
|
|
|
}
|
2019-07-26 22:33:33 +02:00
|
|
|
let removedPendingEvents;
|
2020-09-23 17:34:25 +02:00
|
|
|
if (Array.isArray(roomResponse.timeline?.events)) {
|
2021-05-21 10:47:48 +02:00
|
|
|
removedPendingEvents = await this._sendQueue.removeRemoteEchos(roomResponse.timeline.events, txn, log);
|
2019-07-26 22:33:33 +02:00
|
|
|
}
|
2020-08-21 18:11:07 +02:00
|
|
|
return {
|
|
|
|
summaryChanges,
|
2020-09-23 14:26:14 +02:00
|
|
|
roomEncryption,
|
2021-03-03 11:27:18 +01:00
|
|
|
newEntries,
|
2021-05-20 10:01:30 +02:00
|
|
|
updatedEntries,
|
2020-08-21 18:11:07 +02:00
|
|
|
newLiveKey,
|
|
|
|
removedPendingEvents,
|
2020-08-31 09:50:57 +02:00
|
|
|
memberChanges,
|
2020-09-08 14:38:27 +02:00
|
|
|
heroChanges,
|
2021-03-02 19:14:29 +01:00
|
|
|
shouldFlushKeyShares,
|
2020-08-21 18:11:07 +02:00
|
|
|
};
|
2019-02-27 19:27:45 +01:00
|
|
|
}
|
|
|
|
|
2020-09-08 14:39:33 +02:00
|
|
|
/**
|
|
|
|
* @package
|
|
|
|
* Called with the changes returned from `writeSync` to apply them and emit changes.
|
|
|
|
* No storage or network operations should be done here.
|
|
|
|
*/
|
2021-03-03 11:27:18 +01:00
|
|
|
afterSync(changes, log) {
|
|
|
|
const {
|
|
|
|
summaryChanges, newEntries, updatedEntries, newLiveKey,
|
|
|
|
removedPendingEvents, memberChanges,
|
|
|
|
heroChanges, roomEncryption
|
|
|
|
} = changes;
|
2021-02-17 18:45:04 +01:00
|
|
|
log.set("id", this.id);
|
2020-03-14 20:49:15 +01:00
|
|
|
this._syncWriter.afterSync(newLiveKey);
|
2020-09-23 14:26:14 +02:00
|
|
|
this._setEncryption(roomEncryption);
|
2020-08-31 09:50:57 +02:00
|
|
|
if (memberChanges.size) {
|
2020-08-19 16:12:49 +02:00
|
|
|
if (this._changedMembersDuringSync) {
|
2020-08-31 09:50:57 +02:00
|
|
|
for (const [userId, memberChange] of memberChanges.entries()) {
|
|
|
|
this._changedMembersDuringSync.set(userId, memberChange.member);
|
2020-08-19 16:12:49 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (this._memberList) {
|
2020-08-31 09:50:57 +02:00
|
|
|
this._memberList.afterSync(memberChanges);
|
2020-08-19 16:12:49 +02:00
|
|
|
}
|
2021-03-03 14:53:22 +01:00
|
|
|
if (this._timeline) {
|
|
|
|
for (const [userId, memberChange] of memberChanges.entries()) {
|
|
|
|
if (userId === this._user.id) {
|
|
|
|
this._timeline.updateOwnMember(memberChange.member);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2020-08-19 16:12:49 +02:00
|
|
|
}
|
2020-08-21 18:11:07 +02:00
|
|
|
let emitChange = false;
|
2020-03-14 20:46:49 +01:00
|
|
|
if (summaryChanges) {
|
2020-06-26 23:26:24 +02:00
|
|
|
this._summary.applyChanges(summaryChanges);
|
2020-09-23 14:26:14 +02:00
|
|
|
if (!this._summary.data.needsHeroes) {
|
2020-08-21 18:11:07 +02:00
|
|
|
this._heroes = null;
|
|
|
|
}
|
|
|
|
emitChange = true;
|
|
|
|
}
|
|
|
|
if (this._heroes && heroChanges) {
|
|
|
|
const oldName = this.name;
|
2020-09-23 14:26:14 +02:00
|
|
|
this._heroes.applyChanges(heroChanges, this._summary.data);
|
2020-08-21 18:11:07 +02:00
|
|
|
if (oldName !== this.name) {
|
|
|
|
emitChange = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (emitChange) {
|
2020-09-14 16:33:43 +02:00
|
|
|
this._emitUpdate();
|
2019-02-20 23:48:16 +01:00
|
|
|
}
|
2019-02-27 22:50:08 +01:00
|
|
|
if (this._timeline) {
|
2021-03-03 11:27:18 +01:00
|
|
|
// these should not be added if not already there
|
|
|
|
this._timeline.replaceEntries(updatedEntries);
|
|
|
|
this._timeline.addOrReplaceEntries(newEntries);
|
2019-02-27 22:50:08 +01:00
|
|
|
}
|
2020-10-30 15:19:51 +01:00
|
|
|
if (this._observedEvents) {
|
2021-03-03 11:27:18 +01:00
|
|
|
this._observedEvents.updateEvents(updatedEntries);
|
|
|
|
this._observedEvents.updateEvents(newEntries);
|
2020-10-30 15:19:51 +01:00
|
|
|
}
|
2019-07-26 22:33:33 +02:00
|
|
|
if (removedPendingEvents) {
|
|
|
|
this._sendQueue.emitRemovals(removedPendingEvents);
|
|
|
|
}
|
2020-09-23 18:22:51 +02:00
|
|
|
}
|
2018-12-21 14:35:24 +01:00
|
|
|
|
2021-03-02 19:14:29 +01:00
|
|
|
needsAfterSyncCompleted({shouldFlushKeyShares}) {
|
|
|
|
return shouldFlushKeyShares;
|
2020-09-10 12:11:43 +02:00
|
|
|
}
|
|
|
|
|
2020-09-08 14:38:27 +02:00
|
|
|
/**
|
|
|
|
* Only called if the result of writeSync had `needsAfterSyncCompleted` set.
|
|
|
|
* Can be used to do longer running operations that resulted from the last sync,
|
|
|
|
* like network operations.
|
|
|
|
*/
|
2021-04-20 18:03:27 +02:00
|
|
|
async afterSyncCompleted(changes, log) {
|
2021-02-17 18:45:04 +01:00
|
|
|
log.set("id", this.id);
|
2020-09-08 14:38:27 +02:00
|
|
|
if (this._roomEncryption) {
|
2021-02-23 19:22:25 +01:00
|
|
|
await this._roomEncryption.flushPendingRoomKeyShares(this._hsApi, null, log);
|
2020-09-08 14:38:27 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-19 16:58:28 +02:00
|
|
|
/** @package */
|
2021-02-23 19:22:25 +01:00
|
|
|
start(pendingOperations, parentLog) {
|
2020-09-08 14:39:07 +02:00
|
|
|
if (this._roomEncryption) {
|
2021-02-23 19:22:25 +01:00
|
|
|
const roomKeyShares = pendingOperations?.get("share_room_key");
|
|
|
|
if (roomKeyShares) {
|
|
|
|
// if we got interrupted last time sending keys to newly joined members
|
|
|
|
parentLog.wrapDetached("flush room keys", log => {
|
|
|
|
log.set("id", this.id);
|
|
|
|
return this._roomEncryption.flushPendingRoomKeyShares(this._hsApi, roomKeyShares, log);
|
|
|
|
});
|
2020-09-08 14:39:07 +02:00
|
|
|
}
|
|
|
|
}
|
2021-02-23 19:22:25 +01:00
|
|
|
|
|
|
|
this._sendQueue.resumeSending(parentLog);
|
2019-07-26 22:40:39 +02:00
|
|
|
}
|
|
|
|
|
2020-08-19 16:58:28 +02:00
|
|
|
/** @package */
|
2021-02-23 19:22:25 +01:00
|
|
|
async load(summary, txn, log) {
|
2020-08-17 10:48:00 +02:00
|
|
|
try {
|
2021-05-12 23:07:25 +02:00
|
|
|
await super.load(summary, txn, log);
|
|
|
|
await this._syncWriter.load(txn, log);
|
2020-08-17 10:48:00 +02:00
|
|
|
} catch (err) {
|
|
|
|
throw new WrappedError(`Could not load room ${this._roomId}`, err);
|
|
|
|
}
|
2020-09-23 18:22:51 +02:00
|
|
|
}
|
2019-02-26 22:45:58 +01:00
|
|
|
|
2021-05-21 10:47:48 +02:00
|
|
|
async _writeGapFill(gapChunk, txn, log) {
|
|
|
|
const removedPendingEvents = await this._sendQueue.removeRemoteEchos(gapChunk, txn, log);
|
2021-05-07 16:13:49 +02:00
|
|
|
return removedPendingEvents;
|
|
|
|
}
|
|
|
|
|
|
|
|
_applyGapFill(removedPendingEvents) {
|
|
|
|
this._sendQueue.emitRemovals(removedPendingEvents);
|
|
|
|
}
|
|
|
|
|
2020-08-19 16:58:28 +02:00
|
|
|
/** @public */
|
2021-02-23 19:22:59 +01:00
|
|
|
sendEvent(eventType, content, attachments, log = null) {
|
|
|
|
this._platform.logger.wrapOrRun(log, "send", log => {
|
|
|
|
log.set("id", this.id);
|
|
|
|
return this._sendQueue.enqueueEvent(eventType, content, attachments, log);
|
|
|
|
});
|
2019-07-26 22:33:33 +02:00
|
|
|
}
|
|
|
|
|
2021-05-20 14:53:17 +02:00
|
|
|
/** @public */
|
|
|
|
sendRedaction(eventIdOrTxnId, reason, log = null) {
|
|
|
|
this._platform.logger.wrapOrRun(log, "redact", log => {
|
|
|
|
log.set("id", this.id);
|
|
|
|
return this._sendQueue.enqueueRedaction(eventIdOrTxnId, reason, log);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2020-11-11 10:47:55 +01:00
|
|
|
/** @public */
|
2021-02-23 19:22:59 +01:00
|
|
|
async ensureMessageKeyIsShared(log = null) {
|
|
|
|
if (!this._roomEncryption) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
return this._platform.logger.wrapOrRun(log, "ensureMessageKeyIsShared", log => {
|
|
|
|
log.set("id", this.id);
|
|
|
|
return this._roomEncryption.ensureMessageKeyIsShared(this._hsApi, log);
|
|
|
|
});
|
2020-11-06 23:43:02 +01:00
|
|
|
}
|
|
|
|
|
2020-08-21 11:56:45 +02:00
|
|
|
get isUnread() {
|
2020-09-23 14:26:14 +02:00
|
|
|
return this._summary.data.isUnread;
|
2020-08-21 11:56:45 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
get notificationCount() {
|
2020-09-23 14:26:14 +02:00
|
|
|
return this._summary.data.notificationCount;
|
2020-08-21 11:56:45 +02:00
|
|
|
}
|
2020-08-21 15:50:32 +02:00
|
|
|
|
|
|
|
get highlightCount() {
|
2020-09-23 14:26:14 +02:00
|
|
|
return this._summary.data.highlightCount;
|
2020-08-21 15:50:32 +02:00
|
|
|
}
|
2020-08-21 11:56:45 +02:00
|
|
|
|
2020-08-31 08:53:47 +02:00
|
|
|
get isTrackingMembers() {
|
2020-09-23 14:26:14 +02:00
|
|
|
return this._summary.data.isTrackingMembers;
|
2020-08-31 08:53:47 +02:00
|
|
|
}
|
|
|
|
|
2020-08-21 15:16:57 +02:00
|
|
|
async _getLastEventId() {
|
|
|
|
const lastKey = this._syncWriter.lastMessageKey;
|
|
|
|
if (lastKey) {
|
2021-03-04 19:47:02 +01:00
|
|
|
const txn = await this._storage.readTxn([
|
2020-08-21 15:16:57 +02:00
|
|
|
this._storage.storeNames.timelineEvents,
|
|
|
|
]);
|
|
|
|
const eventEntry = await txn.timelineEvents.get(this._roomId, lastKey);
|
|
|
|
return eventEntry?.event?.event_id;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-24 11:22:19 +01:00
|
|
|
async clearUnread(log = null) {
|
2020-08-21 15:16:57 +02:00
|
|
|
if (this.isUnread || this.notificationCount) {
|
2021-02-24 11:22:19 +01:00
|
|
|
return await this._platform.logger.wrapOrRun(log, "clearUnread", async log => {
|
|
|
|
log.set("id", this.id);
|
2021-03-04 19:47:02 +01:00
|
|
|
const txn = await this._storage.readWriteTxn([
|
2021-02-24 11:22:19 +01:00
|
|
|
this._storage.storeNames.roomSummary,
|
|
|
|
]);
|
|
|
|
let data;
|
|
|
|
try {
|
|
|
|
data = this._summary.writeClearUnread(txn);
|
|
|
|
} catch (err) {
|
|
|
|
txn.abort();
|
2020-08-21 15:23:25 +02:00
|
|
|
throw err;
|
|
|
|
}
|
2021-02-24 11:22:19 +01:00
|
|
|
await txn.complete();
|
|
|
|
this._summary.applyChanges(data);
|
|
|
|
this._emitUpdate();
|
|
|
|
|
|
|
|
try {
|
|
|
|
const lastEventId = await this._getLastEventId();
|
|
|
|
if (lastEventId) {
|
|
|
|
await this._hsApi.receipt(this._roomId, "m.read", lastEventId);
|
|
|
|
}
|
|
|
|
} catch (err) {
|
|
|
|
// ignore ConnectionError
|
|
|
|
if (err.name !== "ConnectionError") {
|
|
|
|
throw err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
2020-08-21 11:56:10 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-12 13:59:08 +02:00
|
|
|
leave(log = null) {
|
|
|
|
return this._platform.logger.wrapOrRun(log, "leave room", async log => {
|
|
|
|
log.set("id", this.id);
|
|
|
|
await this._hsApi.leave(this.id, {log}).response();
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2021-05-07 16:13:49 +02:00
|
|
|
/* called by BaseRoom to pass pendingEvents when opening the timeline */
|
|
|
|
_getPendingEvents() {
|
|
|
|
return this._sendQueue.pendingEvents;
|
2020-05-09 20:02:08 +02:00
|
|
|
}
|
2020-08-31 14:11:08 +02:00
|
|
|
|
|
|
|
/** @package */
|
|
|
|
writeIsTrackingMembers(value, txn) {
|
|
|
|
return this._summary.writeIsTrackingMembers(value, txn);
|
|
|
|
}
|
|
|
|
|
|
|
|
/** @package */
|
|
|
|
applyIsTrackingMembersChanges(changes) {
|
|
|
|
this._summary.applyChanges(changes);
|
|
|
|
}
|
2020-09-18 13:08:18 +02:00
|
|
|
|
2020-11-13 17:19:19 +01:00
|
|
|
createAttachment(blob, filename) {
|
2020-11-18 13:02:38 +01:00
|
|
|
return new AttachmentUpload({blob, filename, platform: this._platform});
|
2020-11-11 10:47:55 +01:00
|
|
|
}
|
|
|
|
|
2020-09-18 13:08:18 +02:00
|
|
|
dispose() {
|
2021-05-07 16:13:49 +02:00
|
|
|
super.dispose();
|
2020-11-18 20:08:42 +01:00
|
|
|
this._sendQueue.dispose();
|
2020-09-18 13:08:18 +02:00
|
|
|
}
|
2019-02-20 23:48:16 +01:00
|
|
|
}
|