* rework general settings * account settings - WIP * add missing key prop * add object url hook * extract wide modal styles * profile settings and image editor - WIP * add outline style to upload card * remove file param from bind upload atom hook * add compact variant to upload card * add compact upload card renderer * add option to update profile avatar * add option to change profile displayname * allow displayname change based on capabilities check * rearrange settings components into folders * add system notification settings * add initial page param in settings * convert account data hook to typescript * add push rule hook * add notification mode hook * add notification mode switcher component * add all messages notification settings options * add special messages notification settings * add keyword notifications * add ignored users section * improve ignore user list strings * add about settings * add access token option in about settings * add developer tools settings * add expand button to account data dev tool option * update folds * fix editable active element textarea check * do not close dialog when editable element in focus * add text area plugins * add text area intent handler hook * add newline intent mod in text area * add next line hotkey in text area intent hook * add syntax error position dom utility function * add account data editor * add button to send new account data in dev tools * improve custom emoji plugin * add more custom emojis hooks * add text util css * add word break in setting tile title and description * emojis and sticker user settings - WIP * view image packs from settings * emoji pack editing - WIP * add option to edit pack meta * change saved changes message * add image edit and delete controls * add option to upload pack images and apply changes * fix state event type when updating image pack * lazy load pack image tile img * hide upload image button when user can not edit pack * add option to add or remove global image packs * upgrade to rust crypto (#2168) * update matrix js sdk * remove dead code * use rust crypto * update setPowerLevel usage * fix types * fix deprecated isRoomEncrypted method uses * fix deprecated room.currentState uses * fix deprecated import/export room keys func * fix merge issues in image pack file * fix remaining issues in image pack file * start indexedDBStore * update package lock and vite-plugin-top-level-await * user session settings - WIP * add useAsync hook * add password stage uia * add uia flow matrix error hook * add UIA action component * add options to delete sessions * add sso uia stage * fix SSO stage complete error * encryption - WIP * update user settings encryption terminology * add default variant to password input * use password input in uia password stage * add options for local backup in user settings * remove typo in import local backup password input label * online backup - WIP * fix uia sso action * move access token settings from about to developer tools * merge encryption tab into sessions and rename it to devices * add device placeholder tile * add logout dialog * add logout button for current device * move other devices in component * render unverified device verification tile * add learn more section for current device verification * add device verification status badge * add info card component * add index file for password input component * add types for secret storage * add component to access secret storage key * manual verification - WIP * update matrix-js-sdk to v35 * add manual verification * use react query for device list * show unverified tab on sidebar * fix device list updates * add session key details to current device * render restore encryption backup * fix loading state of restore backup * fix unverified tab settings closes after verification * key backup tile - WIP * fix unverified tab badge * rename session key to device key in device tile * improve backup restore functionality * fix restore button enabled after layout reload during restoring backup * update backup info on status change * add backup disconnection failures * add device verification using sas * restore backup after verification * show option to logout on startup error screen * fix key backup hook update on decryption key cached * add option to enable device verification * add device verification reset dialog * add logout button in settings drawer * add encrypted message lost on logout * fix backup restore never finish with 0 keys * fix setup dialog hides when enabling device verification * show backup details in menu * update setup device verification body copy * replace deprecated method * fix displayname appear as mxid in settings * remove old refactored codes * fix types
112 lines
3.2 KiB
JavaScript
112 lines
3.2 KiB
JavaScript
import HashIC from '../../public/res/ic/outlined/hash.svg';
|
|
import HashGlobeIC from '../../public/res/ic/outlined/hash-globe.svg';
|
|
import HashLockIC from '../../public/res/ic/outlined/hash-lock.svg';
|
|
import SpaceIC from '../../public/res/ic/outlined/space.svg';
|
|
import SpaceGlobeIC from '../../public/res/ic/outlined/space-globe.svg';
|
|
import SpaceLockIC from '../../public/res/ic/outlined/space-lock.svg';
|
|
|
|
const WELL_KNOWN_URI = '/.well-known/matrix/client';
|
|
|
|
export async function getBaseUrl(servername) {
|
|
let protocol = 'https://';
|
|
if (servername.match(/^https?:\/\//) !== null) protocol = '';
|
|
const serverDiscoveryUrl = `${protocol}${servername}${WELL_KNOWN_URI}`;
|
|
try {
|
|
const result = await (await fetch(serverDiscoveryUrl, { method: 'GET' })).json();
|
|
|
|
const baseUrl = result?.['m.homeserver']?.base_url;
|
|
if (baseUrl === undefined) throw new Error();
|
|
return baseUrl;
|
|
} catch (e) {
|
|
return `${protocol}${servername}`;
|
|
}
|
|
}
|
|
|
|
export function getUsername(mx, userId) {
|
|
const user = mx.getUser(userId);
|
|
if (user === null) return userId;
|
|
let username = user.displayName;
|
|
if (typeof username === 'undefined') {
|
|
username = userId;
|
|
}
|
|
return username;
|
|
}
|
|
|
|
export function getUsernameOfRoomMember(roomMember) {
|
|
return roomMember.name || roomMember.userId;
|
|
}
|
|
|
|
export async function isRoomAliasAvailable(mx, alias) {
|
|
try {
|
|
const result = await mx.getRoomIdForAlias(alias);
|
|
if (result.room_id) return false;
|
|
return false;
|
|
} catch (e) {
|
|
if (e.errcode === 'M_NOT_FOUND') return true;
|
|
return false;
|
|
}
|
|
}
|
|
|
|
export function getPowerLabel(powerLevel) {
|
|
if (powerLevel > 9000) return 'Goku';
|
|
if (powerLevel > 100) return 'Founder';
|
|
if (powerLevel === 100) return 'Admin';
|
|
if (powerLevel >= 50) return 'Mod';
|
|
return null;
|
|
}
|
|
|
|
export function parseReply(rawBody) {
|
|
if (rawBody?.indexOf('>') !== 0) return null;
|
|
let body = rawBody.slice(rawBody.indexOf('<') + 1);
|
|
const user = body.slice(0, body.indexOf('>'));
|
|
|
|
body = body.slice(body.indexOf('>') + 2);
|
|
const replyBody = body.slice(0, body.indexOf('\n\n'));
|
|
body = body.slice(body.indexOf('\n\n') + 2);
|
|
|
|
if (user === '') return null;
|
|
|
|
const isUserId = user.match(/^@.+:.+/);
|
|
|
|
return {
|
|
userId: isUserId ? user : null,
|
|
displayName: isUserId ? null : user,
|
|
replyBody,
|
|
body,
|
|
};
|
|
}
|
|
|
|
export function trimHTMLReply(html) {
|
|
if (!html) return html;
|
|
const suffix = '</mx-reply>';
|
|
const i = html.indexOf(suffix);
|
|
if (i < 0) {
|
|
return html;
|
|
}
|
|
return html.slice(i + suffix.length);
|
|
}
|
|
|
|
export function joinRuleToIconSrc(joinRule, isSpace) {
|
|
return ({
|
|
restricted: () => (isSpace ? SpaceIC : HashIC),
|
|
knock: () => (isSpace ? SpaceLockIC : HashLockIC),
|
|
invite: () => (isSpace ? SpaceLockIC : HashLockIC),
|
|
public: () => (isSpace ? SpaceGlobeIC : HashGlobeIC),
|
|
}[joinRule]?.() || null);
|
|
}
|
|
|
|
export function getIdServer(userId) {
|
|
const idParts = userId.split(':');
|
|
return idParts[1];
|
|
}
|
|
|
|
export async function hasDevices(mx, userId) {
|
|
try {
|
|
const usersDeviceMap = await mx.getUserDeviceInfo([userId, mx.getUserId()]);
|
|
return Object.values(usersDeviceMap)
|
|
.every((deviceIdToDevices) => deviceIdToDevices.size > 0);
|
|
} catch (e) {
|
|
console.error("Error determining if it's possible to encrypt to all users: ", e);
|
|
return false;
|
|
}
|
|
}
|