2019-12-05 18:05:28 +03:00
|
|
|
|
/*
|
|
|
|
|
Copyright 2018, 2019 New Vector Ltd
|
2020-01-22 13:44:02 +03:00
|
|
|
|
Copyright 2019, 2020 The Matrix.org Foundation C.I.C.
|
2019-12-05 18:05:28 +03:00
|
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
|
limitations under the License.
|
|
|
|
|
*/
|
|
|
|
|
|
2020-05-14 22:33:50 +03:00
|
|
|
|
import React, {createRef} from 'react';
|
2020-01-24 22:11:57 +03:00
|
|
|
|
import PropTypes from 'prop-types';
|
2019-12-20 04:19:56 +03:00
|
|
|
|
import * as sdk from '../../../../index';
|
2019-12-21 00:13:46 +03:00
|
|
|
|
import {MatrixClientPeg} from '../../../../MatrixClientPeg';
|
2019-12-05 18:05:28 +03:00
|
|
|
|
import FileSaver from 'file-saver';
|
2020-05-29 17:42:07 +03:00
|
|
|
|
import {_t} from '../../../../languageHandler';
|
2019-12-05 18:05:28 +03:00
|
|
|
|
import Modal from '../../../../Modal';
|
2020-03-19 23:42:16 +03:00
|
|
|
|
import { promptForBackupPassphrase } from '../../../../CrossSigningManager';
|
2020-04-15 02:16:11 +03:00
|
|
|
|
import {copyNode} from "../../../../utils/strings";
|
2020-05-06 23:24:37 +03:00
|
|
|
|
import {SSOAuthEntry} from "../../../../components/views/auth/InteractiveAuthEntryComponents";
|
2020-06-03 11:55:48 +03:00
|
|
|
|
import AccessibleButton from "../../../../components/views/elements/AccessibleButton";
|
|
|
|
|
import DialogButtons from "../../../../components/views/elements/DialogButtons";
|
|
|
|
|
import InlineSpinner from "../../../../components/views/elements/InlineSpinner";
|
|
|
|
|
|
2019-12-05 18:05:28 +03:00
|
|
|
|
|
2019-12-19 14:26:20 +03:00
|
|
|
|
const PHASE_LOADING = 0;
|
2020-04-20 20:10:23 +03:00
|
|
|
|
const PHASE_LOADERROR = 1;
|
|
|
|
|
const PHASE_MIGRATE = 2;
|
2020-05-29 17:42:07 +03:00
|
|
|
|
const PHASE_INTRO = 3;
|
|
|
|
|
const PHASE_SHOWKEY = 4;
|
|
|
|
|
const PHASE_STORING = 5;
|
|
|
|
|
const PHASE_CONFIRM_SKIP = 6;
|
2019-12-05 18:05:28 +03:00
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Walks the user through the process of creating a passphrase to guard Secure
|
|
|
|
|
* Secret Storage in account data.
|
|
|
|
|
*/
|
|
|
|
|
export default class CreateSecretStorageDialog extends React.PureComponent {
|
2020-01-24 22:11:57 +03:00
|
|
|
|
static propTypes = {
|
|
|
|
|
hasCancel: PropTypes.bool,
|
2020-01-25 18:28:06 +03:00
|
|
|
|
accountPassword: PropTypes.string,
|
2020-02-07 17:55:01 +03:00
|
|
|
|
force: PropTypes.bool,
|
2020-01-24 22:11:57 +03:00
|
|
|
|
};
|
|
|
|
|
|
2020-01-28 19:36:07 +03:00
|
|
|
|
static defaultProps = {
|
2020-01-24 22:11:57 +03:00
|
|
|
|
hasCancel: true,
|
2020-02-07 17:55:01 +03:00
|
|
|
|
force: false,
|
2020-01-24 22:11:57 +03:00
|
|
|
|
};
|
|
|
|
|
|
2019-12-05 18:05:28 +03:00
|
|
|
|
constructor(props) {
|
|
|
|
|
super(props);
|
|
|
|
|
|
2020-03-30 23:40:09 +03:00
|
|
|
|
this._recoveryKey = null;
|
2019-12-05 18:05:28 +03:00
|
|
|
|
this._recoveryKeyNode = null;
|
2020-04-09 19:30:10 +03:00
|
|
|
|
this._backupKey = null;
|
2019-12-05 18:05:28 +03:00
|
|
|
|
|
|
|
|
|
this.state = {
|
2019-12-19 14:26:20 +03:00
|
|
|
|
phase: PHASE_LOADING,
|
2019-12-05 18:05:28 +03:00
|
|
|
|
downloaded: false,
|
2020-05-29 17:42:07 +03:00
|
|
|
|
copied: false,
|
2020-01-09 23:49:37 +03:00
|
|
|
|
backupInfo: null,
|
2020-05-29 17:42:07 +03:00
|
|
|
|
backupInfoFetched: false,
|
|
|
|
|
backupInfoFetchError: null,
|
2020-01-09 23:49:37 +03:00
|
|
|
|
backupSigStatus: null,
|
2020-01-22 13:44:02 +03:00
|
|
|
|
// does the server offer a UI auth flow with just m.login.password
|
2020-05-29 17:42:07 +03:00
|
|
|
|
// for /keys/device_signing/upload? (If we have an account password, we
|
|
|
|
|
// assume that it can)
|
2020-05-29 17:55:16 +03:00
|
|
|
|
canUploadKeysWithPasswordOnly: null,
|
2020-05-29 17:42:07 +03:00
|
|
|
|
canUploadKeyCheckInProgress: false,
|
2020-02-28 16:52:24 +03:00
|
|
|
|
accountPassword: props.accountPassword || "",
|
2020-01-22 13:44:02 +03:00
|
|
|
|
accountPasswordCorrect: null,
|
2020-05-29 17:42:07 +03:00
|
|
|
|
// No toggle for this: if we really don't want one, remove it & just hard code true
|
2020-01-28 22:42:09 +03:00
|
|
|
|
useKeyBackup: true,
|
2019-12-05 18:05:28 +03:00
|
|
|
|
};
|
2019-12-19 14:26:20 +03:00
|
|
|
|
|
2020-05-29 17:55:16 +03:00
|
|
|
|
if (props.accountPassword) {
|
|
|
|
|
// If we have an account password, we assume we can upload keys with
|
|
|
|
|
// just a password (otherwise leave it as null so we poll to check)
|
|
|
|
|
this.state.canUploadKeysWithPasswordOnly = true;
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-14 22:33:50 +03:00
|
|
|
|
this._passphraseField = createRef();
|
|
|
|
|
|
2020-05-29 17:42:07 +03:00
|
|
|
|
this.loadData();
|
2020-01-24 22:11:57 +03:00
|
|
|
|
|
|
|
|
|
MatrixClientPeg.get().on('crypto.keyBackupStatus', this._onKeyBackupStatusChange);
|
2019-12-05 18:05:28 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
componentWillUnmount() {
|
2020-01-24 22:11:57 +03:00
|
|
|
|
MatrixClientPeg.get().removeListener('crypto.keyBackupStatus', this._onKeyBackupStatusChange);
|
2019-12-05 18:05:28 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-12-19 14:26:20 +03:00
|
|
|
|
async _fetchBackupInfo() {
|
2020-04-20 20:10:23 +03:00
|
|
|
|
try {
|
|
|
|
|
const backupInfo = await MatrixClientPeg.get().getKeyBackupVersion();
|
|
|
|
|
const backupSigStatus = (
|
|
|
|
|
// we may not have started crypto yet, in which case we definitely don't trust the backup
|
|
|
|
|
MatrixClientPeg.get().isCryptoEnabled() && await MatrixClientPeg.get().isKeyBackupTrusted(backupInfo)
|
|
|
|
|
);
|
2020-01-09 23:49:37 +03:00
|
|
|
|
|
2020-04-20 20:10:23 +03:00
|
|
|
|
this.setState({
|
2020-05-29 17:42:07 +03:00
|
|
|
|
backupInfoFetched: true,
|
2020-04-20 20:10:23 +03:00
|
|
|
|
backupInfo,
|
|
|
|
|
backupSigStatus,
|
2020-05-29 17:42:07 +03:00
|
|
|
|
backupInfoFetchError: null,
|
2020-04-20 20:10:23 +03:00
|
|
|
|
});
|
2020-02-28 16:47:12 +03:00
|
|
|
|
|
2020-04-20 20:10:23 +03:00
|
|
|
|
return {
|
|
|
|
|
backupInfo,
|
|
|
|
|
backupSigStatus,
|
|
|
|
|
};
|
|
|
|
|
} catch (e) {
|
2020-05-29 17:42:07 +03:00
|
|
|
|
this.setState({backupInfoFetchError: e});
|
2020-04-20 20:10:23 +03:00
|
|
|
|
}
|
2019-12-19 14:26:20 +03:00
|
|
|
|
}
|
|
|
|
|
|
2020-01-22 13:44:02 +03:00
|
|
|
|
async _queryKeyUploadAuth() {
|
|
|
|
|
try {
|
2020-05-29 17:42:07 +03:00
|
|
|
|
this.setState({canUploadKeyCheckInProgress: true});
|
2020-01-22 13:44:02 +03:00
|
|
|
|
await MatrixClientPeg.get().uploadDeviceSigningKeys(null, {});
|
|
|
|
|
// We should never get here: the server should always require
|
|
|
|
|
// UI auth to upload device signing keys. If we do, we upload
|
|
|
|
|
// no keys which would be a no-op.
|
|
|
|
|
console.log("uploadDeviceSigningKeys unexpectedly succeeded without UI auth!");
|
2020-05-29 17:42:07 +03:00
|
|
|
|
this.setState({canUploadKeyCheckInProgress: false});
|
2020-01-22 13:44:02 +03:00
|
|
|
|
} catch (error) {
|
2020-04-20 20:10:23 +03:00
|
|
|
|
if (!error.data || !error.data.flows) {
|
2020-01-22 13:44:02 +03:00
|
|
|
|
console.log("uploadDeviceSigningKeys advertised no flows!");
|
2020-05-29 17:42:07 +03:00
|
|
|
|
this.setState({
|
|
|
|
|
canUploadKeyCheckInProgress: false,
|
|
|
|
|
});
|
2020-04-20 20:10:23 +03:00
|
|
|
|
return;
|
2020-01-22 13:44:02 +03:00
|
|
|
|
}
|
|
|
|
|
const canUploadKeysWithPasswordOnly = error.data.flows.some(f => {
|
|
|
|
|
return f.stages.length === 1 && f.stages[0] === 'm.login.password';
|
|
|
|
|
});
|
|
|
|
|
this.setState({
|
|
|
|
|
canUploadKeysWithPasswordOnly,
|
2020-05-29 17:42:07 +03:00
|
|
|
|
canUploadKeyCheckInProgress: false,
|
2020-01-22 13:44:02 +03:00
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-29 17:42:07 +03:00
|
|
|
|
async _createRecoveryKey() {
|
|
|
|
|
this._recoveryKey = await MatrixClientPeg.get().createRecoveryKeyFromPassphrase();
|
|
|
|
|
this.setState({
|
|
|
|
|
phase: PHASE_SHOWKEY,
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-24 22:11:57 +03:00
|
|
|
|
_onKeyBackupStatusChange = () => {
|
2020-01-28 22:42:09 +03:00
|
|
|
|
if (this.state.phase === PHASE_MIGRATE) this._fetchBackupInfo();
|
2020-01-24 22:11:57 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-12-05 18:05:28 +03:00
|
|
|
|
_collectRecoveryKeyNode = (n) => {
|
|
|
|
|
this._recoveryKeyNode = n;
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-22 13:44:02 +03:00
|
|
|
|
_onMigrateFormSubmit = (e) => {
|
|
|
|
|
e.preventDefault();
|
2020-01-28 19:36:07 +03:00
|
|
|
|
if (this.state.backupSigStatus.usable) {
|
|
|
|
|
this._bootstrapSecretStorage();
|
|
|
|
|
} else {
|
|
|
|
|
this._restoreBackup();
|
|
|
|
|
}
|
2019-12-19 14:26:20 +03:00
|
|
|
|
}
|
|
|
|
|
|
2020-05-29 17:42:07 +03:00
|
|
|
|
_onIntroContinueClick = () => {
|
|
|
|
|
this._createRecoveryKey();
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-05 18:05:28 +03:00
|
|
|
|
_onCopyClick = () => {
|
2020-04-15 02:16:11 +03:00
|
|
|
|
const successful = copyNode(this._recoveryKeyNode);
|
2019-12-05 18:05:28 +03:00
|
|
|
|
if (successful) {
|
|
|
|
|
this.setState({
|
|
|
|
|
copied: true,
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
_onDownloadClick = () => {
|
2020-03-31 12:45:53 +03:00
|
|
|
|
const blob = new Blob([this._recoveryKey.encodedPrivateKey], {
|
2019-12-05 18:05:28 +03:00
|
|
|
|
type: 'text/plain;charset=us-ascii',
|
|
|
|
|
});
|
|
|
|
|
FileSaver.saveAs(blob, 'recovery-key.txt');
|
|
|
|
|
this.setState({
|
|
|
|
|
downloaded: true,
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-22 13:44:02 +03:00
|
|
|
|
_doBootstrapUIAuth = async (makeRequest) => {
|
2020-01-22 14:44:47 +03:00
|
|
|
|
if (this.state.canUploadKeysWithPasswordOnly && this.state.accountPassword) {
|
2020-01-22 13:44:02 +03:00
|
|
|
|
await makeRequest({
|
|
|
|
|
type: 'm.login.password',
|
|
|
|
|
identifier: {
|
|
|
|
|
type: 'm.id.user',
|
|
|
|
|
user: MatrixClientPeg.get().getUserId(),
|
|
|
|
|
},
|
2020-05-29 17:23:59 +03:00
|
|
|
|
// TODO: Remove `user` once servers support proper UIA
|
|
|
|
|
// See https://github.com/matrix-org/synapse/issues/5665
|
2020-01-22 13:44:02 +03:00
|
|
|
|
user: MatrixClientPeg.get().getUserId(),
|
|
|
|
|
password: this.state.accountPassword,
|
|
|
|
|
});
|
|
|
|
|
} else {
|
|
|
|
|
const InteractiveAuthDialog = sdk.getComponent("dialogs.InteractiveAuthDialog");
|
2020-05-06 23:24:37 +03:00
|
|
|
|
|
|
|
|
|
const dialogAesthetics = {
|
|
|
|
|
[SSOAuthEntry.PHASE_PREAUTH]: {
|
|
|
|
|
title: _t("Use Single Sign On to continue"),
|
|
|
|
|
body: _t("To continue, use Single Sign On to prove your identity."),
|
|
|
|
|
continueText: _t("Single Sign On"),
|
|
|
|
|
continueKind: "primary",
|
|
|
|
|
},
|
|
|
|
|
[SSOAuthEntry.PHASE_POSTAUTH]: {
|
|
|
|
|
title: _t("Confirm encryption setup"),
|
|
|
|
|
body: _t("Click the button below to confirm setting up encryption."),
|
|
|
|
|
continueText: _t("Confirm"),
|
|
|
|
|
continueKind: "primary",
|
|
|
|
|
},
|
|
|
|
|
};
|
|
|
|
|
|
2020-01-22 13:44:02 +03:00
|
|
|
|
const { finished } = Modal.createTrackedDialog(
|
|
|
|
|
'Cross-signing keys dialog', '', InteractiveAuthDialog,
|
|
|
|
|
{
|
2020-01-31 18:04:51 +03:00
|
|
|
|
title: _t("Setting up keys"),
|
2020-01-22 13:44:02 +03:00
|
|
|
|
matrixClient: MatrixClientPeg.get(),
|
|
|
|
|
makeRequest,
|
2020-05-06 23:24:37 +03:00
|
|
|
|
aestheticsForStagePhases: {
|
|
|
|
|
[SSOAuthEntry.LOGIN_TYPE]: dialogAesthetics,
|
|
|
|
|
[SSOAuthEntry.UNSTABLE_LOGIN_TYPE]: dialogAesthetics,
|
|
|
|
|
},
|
2020-01-22 13:44:02 +03:00
|
|
|
|
},
|
|
|
|
|
);
|
|
|
|
|
const [confirmed] = await finished;
|
|
|
|
|
if (!confirmed) {
|
|
|
|
|
throw new Error("Cross-signing key upload auth canceled");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-05 18:05:28 +03:00
|
|
|
|
_bootstrapSecretStorage = async () => {
|
|
|
|
|
this.setState({
|
2020-05-29 17:42:07 +03:00
|
|
|
|
// we use LOADING here rather than STORING as STORING still shows the 'show key'
|
|
|
|
|
// screen which is not relevant: LOADING is just a generic spinner.
|
|
|
|
|
phase: PHASE_LOADING,
|
2019-12-05 18:05:28 +03:00
|
|
|
|
error: null,
|
|
|
|
|
});
|
2020-01-22 13:44:02 +03:00
|
|
|
|
|
2019-12-05 18:05:28 +03:00
|
|
|
|
const cli = MatrixClientPeg.get();
|
2020-01-22 13:44:02 +03:00
|
|
|
|
|
2020-02-07 17:55:01 +03:00
|
|
|
|
const { force } = this.props;
|
|
|
|
|
|
2019-12-05 18:05:28 +03:00
|
|
|
|
try {
|
2020-02-11 20:56:25 +03:00
|
|
|
|
if (force) {
|
2020-05-06 23:42:03 +03:00
|
|
|
|
console.log("Forcing secret storage reset"); // log something so we can debug this later
|
2020-02-11 18:56:32 +03:00
|
|
|
|
await cli.bootstrapSecretStorage({
|
|
|
|
|
authUploadDeviceSigningKeys: this._doBootstrapUIAuth,
|
2020-03-31 12:45:53 +03:00
|
|
|
|
createSecretStorageKey: async () => this._recoveryKey,
|
2020-05-06 23:42:03 +03:00
|
|
|
|
setupNewKeyBackup: this.state.useKeyBackup,
|
2020-02-11 20:56:25 +03:00
|
|
|
|
setupNewSecretStorage: true,
|
2020-02-11 18:56:32 +03:00
|
|
|
|
});
|
2020-05-06 23:42:03 +03:00
|
|
|
|
if (!this.state.useKeyBackup && this.state.backupInfo) {
|
|
|
|
|
// If the user is resetting their cross-signing keys and doesn't want
|
|
|
|
|
// key backup (but had it enabled before), delete the key backup as it's
|
|
|
|
|
// no longer valid.
|
|
|
|
|
console.log("Deleting invalid key backup (secrets have been reset; key backup not requested)");
|
|
|
|
|
await cli.deleteKeyBackupVersion(this.state.backupInfo.version);
|
|
|
|
|
}
|
2020-02-11 18:56:32 +03:00
|
|
|
|
} else {
|
|
|
|
|
await cli.bootstrapSecretStorage({
|
|
|
|
|
authUploadDeviceSigningKeys: this._doBootstrapUIAuth,
|
2020-03-31 12:45:53 +03:00
|
|
|
|
createSecretStorageKey: async () => this._recoveryKey,
|
2020-02-11 20:56:25 +03:00
|
|
|
|
keyBackupInfo: this.state.backupInfo,
|
|
|
|
|
setupNewKeyBackup: !this.state.backupInfo && this.state.useKeyBackup,
|
2020-04-09 19:30:10 +03:00
|
|
|
|
getKeyBackupPassphrase: () => {
|
|
|
|
|
// We may already have the backup key if we earlier went
|
|
|
|
|
// through the restore backup path, so pass it along
|
|
|
|
|
// rather than prompting again.
|
|
|
|
|
if (this._backupKey) {
|
|
|
|
|
return this._backupKey;
|
|
|
|
|
}
|
|
|
|
|
return promptForBackupPassphrase();
|
|
|
|
|
},
|
2020-02-11 18:56:32 +03:00
|
|
|
|
});
|
|
|
|
|
}
|
2020-05-29 17:42:07 +03:00
|
|
|
|
this.props.onFinished(true);
|
2019-12-05 18:05:28 +03:00
|
|
|
|
} catch (e) {
|
2020-01-22 13:44:02 +03:00
|
|
|
|
if (this.state.canUploadKeysWithPasswordOnly && e.httpStatus === 401 && e.data.flows) {
|
|
|
|
|
this.setState({
|
2020-01-28 19:36:07 +03:00
|
|
|
|
accountPassword: '',
|
2020-01-22 13:44:02 +03:00
|
|
|
|
accountPasswordCorrect: false,
|
|
|
|
|
phase: PHASE_MIGRATE,
|
|
|
|
|
});
|
|
|
|
|
} else {
|
|
|
|
|
this.setState({ error: e });
|
|
|
|
|
}
|
2019-12-05 18:05:28 +03:00
|
|
|
|
console.error("Error bootstrapping secret storage", e);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
_onCancel = () => {
|
|
|
|
|
this.props.onFinished(false);
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-28 19:36:07 +03:00
|
|
|
|
_restoreBackup = async () => {
|
2020-04-09 19:30:10 +03:00
|
|
|
|
// It's possible we'll need the backup key later on for bootstrapping,
|
|
|
|
|
// so let's stash it here, rather than prompting for it twice.
|
|
|
|
|
const keyCallback = k => this._backupKey = k;
|
|
|
|
|
|
2020-01-14 14:52:00 +03:00
|
|
|
|
const RestoreKeyBackupDialog = sdk.getComponent('dialogs.keybackup.RestoreKeyBackupDialog');
|
2020-01-28 19:36:07 +03:00
|
|
|
|
const { finished } = Modal.createTrackedDialog(
|
2020-04-09 19:30:10 +03:00
|
|
|
|
'Restore Backup', '', RestoreKeyBackupDialog,
|
|
|
|
|
{
|
|
|
|
|
showSummary: false,
|
|
|
|
|
keyCallback,
|
|
|
|
|
},
|
|
|
|
|
null, /* priority = */ false, /* static = */ false,
|
2020-01-14 14:52:00 +03:00
|
|
|
|
);
|
2020-01-28 19:36:07 +03:00
|
|
|
|
|
|
|
|
|
await finished;
|
2020-02-28 16:47:12 +03:00
|
|
|
|
const { backupSigStatus } = await this._fetchBackupInfo();
|
2020-01-28 19:36:07 +03:00
|
|
|
|
if (
|
2020-02-28 16:47:12 +03:00
|
|
|
|
backupSigStatus.usable &&
|
2020-01-28 19:36:07 +03:00
|
|
|
|
this.state.canUploadKeysWithPasswordOnly &&
|
|
|
|
|
this.state.accountPassword
|
|
|
|
|
) {
|
|
|
|
|
this._bootstrapSecretStorage();
|
|
|
|
|
}
|
2020-01-14 14:52:00 +03:00
|
|
|
|
}
|
|
|
|
|
|
2020-05-29 17:42:07 +03:00
|
|
|
|
_onShowKeyContinueClick = () => {
|
|
|
|
|
this._bootstrapSecretStorage();
|
2020-04-20 20:10:23 +03:00
|
|
|
|
}
|
|
|
|
|
|
2020-05-29 17:42:07 +03:00
|
|
|
|
_onLoadRetryClick = () => {
|
|
|
|
|
this.loadData();
|
2019-12-05 18:05:28 +03:00
|
|
|
|
}
|
|
|
|
|
|
2020-05-29 17:42:07 +03:00
|
|
|
|
async loadData() {
|
|
|
|
|
this.setState({phase: PHASE_LOADING});
|
|
|
|
|
const proms = [];
|
2019-12-05 18:05:28 +03:00
|
|
|
|
|
2020-05-29 17:42:07 +03:00
|
|
|
|
if (!this.state.backupInfoFetched) proms.push(this._fetchBackupInfo());
|
|
|
|
|
if (this.state.canUploadKeysWithPasswordOnly === null) proms.push(this._queryKeyUploadAuth());
|
2020-02-09 18:03:28 +03:00
|
|
|
|
|
2020-05-29 17:42:07 +03:00
|
|
|
|
await Promise.all(proms);
|
|
|
|
|
if (this.state.canUploadKeysWithPasswordOnly === null || this.state.backupInfoFetchError) {
|
|
|
|
|
this.setState({phase: PHASE_LOADERROR});
|
|
|
|
|
} else if (this.state.backupInfo && !this.props.force) {
|
|
|
|
|
this.setState({phase: PHASE_MIGRATE});
|
|
|
|
|
} else {
|
|
|
|
|
this.setState({phase: PHASE_INTRO});
|
2020-01-29 16:24:45 +03:00
|
|
|
|
}
|
2019-12-05 18:05:28 +03:00
|
|
|
|
}
|
|
|
|
|
|
2020-05-29 17:42:07 +03:00
|
|
|
|
_onSkipSetupClick = () => {
|
|
|
|
|
this.setState({phase: PHASE_CONFIRM_SKIP});
|
2019-12-05 18:05:28 +03:00
|
|
|
|
}
|
|
|
|
|
|
2020-06-02 19:55:27 +03:00
|
|
|
|
_onGoBackClick = () => {
|
|
|
|
|
if (this.state.backupInfo && !this.props.force) {
|
|
|
|
|
this.setState({phase: PHASE_MIGRATE});
|
|
|
|
|
} else {
|
|
|
|
|
this.setState({phase: PHASE_INTRO});
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-22 13:44:02 +03:00
|
|
|
|
_onAccountPasswordChange = (e) => {
|
|
|
|
|
this.setState({
|
|
|
|
|
accountPassword: e.target.value,
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-19 14:26:20 +03:00
|
|
|
|
_renderPhaseMigrate() {
|
2019-12-19 22:49:36 +03:00
|
|
|
|
// TODO: This is a temporary screen so people who have the labs flag turned on and
|
2019-12-19 14:26:20 +03:00
|
|
|
|
// click the button are aware they're making a change to their account.
|
|
|
|
|
// Once we're confident enough in this (and it's supported enough) we can do
|
|
|
|
|
// it automatically.
|
2019-12-19 22:54:44 +03:00
|
|
|
|
// https://github.com/vector-im/riot-web/issues/11696
|
2020-01-22 13:44:02 +03:00
|
|
|
|
const Field = sdk.getComponent('views.elements.Field');
|
|
|
|
|
|
|
|
|
|
let authPrompt;
|
2020-01-28 19:36:07 +03:00
|
|
|
|
let nextCaption = _t("Next");
|
2020-05-29 17:42:07 +03:00
|
|
|
|
if (!this.state.backupSigStatus.usable) {
|
|
|
|
|
authPrompt = <div>
|
|
|
|
|
<div>{_t("Restore your key backup to upgrade your encryption")}</div>
|
|
|
|
|
</div>;
|
|
|
|
|
nextCaption = _t("Restore");
|
2020-05-29 17:55:16 +03:00
|
|
|
|
} else if (this.state.canUploadKeysWithPasswordOnly && !this.props.accountPassword) {
|
2020-01-22 13:44:02 +03:00
|
|
|
|
authPrompt = <div>
|
|
|
|
|
<div>{_t("Enter your account password to confirm the upgrade:")}</div>
|
2020-01-29 16:24:45 +03:00
|
|
|
|
<div><Field
|
|
|
|
|
type="password"
|
2020-01-22 13:44:02 +03:00
|
|
|
|
label={_t("Password")}
|
|
|
|
|
value={this.state.accountPassword}
|
|
|
|
|
onChange={this._onAccountPasswordChange}
|
|
|
|
|
flagInvalid={this.state.accountPasswordCorrect === false}
|
|
|
|
|
autoFocus={true}
|
|
|
|
|
/></div>
|
|
|
|
|
</div>;
|
|
|
|
|
} else {
|
|
|
|
|
authPrompt = <p>
|
|
|
|
|
{_t("You'll need to authenticate with the server to confirm the upgrade.")}
|
|
|
|
|
</p>;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return <form onSubmit={this._onMigrateFormSubmit}>
|
2019-12-19 14:26:20 +03:00
|
|
|
|
<p>{_t(
|
2020-01-29 18:48:25 +03:00
|
|
|
|
"Upgrade this session to allow it to verify other sessions, " +
|
2020-01-22 13:44:02 +03:00
|
|
|
|
"granting them access to encrypted messages and marking them " +
|
|
|
|
|
"as trusted for other users.",
|
2019-12-19 14:26:20 +03:00
|
|
|
|
)}</p>
|
2020-01-22 13:44:02 +03:00
|
|
|
|
<div>{authPrompt}</div>
|
2020-02-09 17:49:54 +03:00
|
|
|
|
<DialogButtons
|
|
|
|
|
primaryButton={nextCaption}
|
2020-02-28 15:04:27 +03:00
|
|
|
|
onPrimaryButtonClick={this._onMigrateFormSubmit}
|
2020-01-28 19:36:07 +03:00
|
|
|
|
hasCancel={false}
|
2020-01-22 13:44:02 +03:00
|
|
|
|
primaryDisabled={this.state.canUploadKeysWithPasswordOnly && !this.state.accountPassword}
|
2020-01-28 19:36:07 +03:00
|
|
|
|
>
|
2020-01-28 22:42:09 +03:00
|
|
|
|
<button type="button" className="danger" onClick={this._onSkipSetupClick}>
|
2020-01-28 19:36:07 +03:00
|
|
|
|
{_t('Skip')}
|
|
|
|
|
</button>
|
|
|
|
|
</DialogButtons>
|
2020-01-22 13:44:02 +03:00
|
|
|
|
</form>;
|
2019-12-19 14:26:20 +03:00
|
|
|
|
}
|
|
|
|
|
|
2020-05-29 17:42:07 +03:00
|
|
|
|
_renderPhaseShowKey() {
|
|
|
|
|
let continueButton;
|
|
|
|
|
if (this.state.phase === PHASE_SHOWKEY) {
|
|
|
|
|
continueButton = <DialogButtons primaryButton={_t("Continue")}
|
|
|
|
|
disabled={!this.state.downloaded && !this.state.copied}
|
|
|
|
|
onPrimaryButtonClick={this._onShowKeyContinueClick}
|
2019-12-05 18:05:28 +03:00
|
|
|
|
hasCancel={false}
|
2020-05-29 17:42:07 +03:00
|
|
|
|
/>;
|
|
|
|
|
} else {
|
|
|
|
|
continueButton = <div className="mx_CreateSecretStorageDialog_continueSpinner">
|
|
|
|
|
<InlineSpinner />
|
2019-12-05 18:05:28 +03:00
|
|
|
|
</div>;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return <div>
|
|
|
|
|
<p>{_t(
|
2020-05-29 17:42:07 +03:00
|
|
|
|
"Store your Recovery Key somewhere safe, it can be used to unlock your encrypted messages & data.",
|
2019-12-05 18:05:28 +03:00
|
|
|
|
)}</p>
|
|
|
|
|
<div className="mx_CreateSecretStorageDialog_primaryContainer">
|
|
|
|
|
<div className="mx_CreateSecretStorageDialog_recoveryKeyContainer">
|
|
|
|
|
<div className="mx_CreateSecretStorageDialog_recoveryKey">
|
2020-03-31 12:45:53 +03:00
|
|
|
|
<code ref={this._collectRecoveryKeyNode}>{this._recoveryKey.encodedPrivateKey}</code>
|
2019-12-05 18:05:28 +03:00
|
|
|
|
</div>
|
|
|
|
|
<div className="mx_CreateSecretStorageDialog_recoveryKeyButtons">
|
2020-05-29 17:42:07 +03:00
|
|
|
|
<AccessibleButton kind='primary' className="mx_Dialog_primary"
|
|
|
|
|
onClick={this._onDownloadClick}
|
|
|
|
|
disabled={this.state.phase === PHASE_STORING}
|
|
|
|
|
>
|
|
|
|
|
{_t("Download")}
|
|
|
|
|
</AccessibleButton>
|
|
|
|
|
<span>{_t("or")}</span>
|
2020-04-16 20:46:29 +03:00
|
|
|
|
<AccessibleButton
|
|
|
|
|
kind='primary'
|
|
|
|
|
className="mx_Dialog_primary mx_CreateSecretStorageDialog_recoveryKeyButtons_copyBtn"
|
|
|
|
|
onClick={this._onCopyClick}
|
2020-05-29 17:42:07 +03:00
|
|
|
|
disabled={this.state.phase === PHASE_STORING}
|
2020-04-16 20:46:29 +03:00
|
|
|
|
>
|
2020-05-29 17:42:07 +03:00
|
|
|
|
{this.state.copied ? _t("Copied!") : _t("Copy")}
|
2020-01-24 22:11:57 +03:00
|
|
|
|
</AccessibleButton>
|
2019-12-05 18:05:28 +03:00
|
|
|
|
</div>
|
|
|
|
|
</div>
|
|
|
|
|
</div>
|
2020-05-29 17:42:07 +03:00
|
|
|
|
{continueButton}
|
2019-12-05 18:05:28 +03:00
|
|
|
|
</div>;
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-19 14:26:20 +03:00
|
|
|
|
_renderBusyPhase() {
|
2019-12-05 18:05:28 +03:00
|
|
|
|
const Spinner = sdk.getComponent('views.elements.Spinner');
|
|
|
|
|
return <div>
|
|
|
|
|
<Spinner />
|
2020-05-29 17:42:07 +03:00
|
|
|
|
</div>;
|
|
|
|
|
}
|
2019-12-05 18:05:28 +03:00
|
|
|
|
|
2020-04-20 20:10:23 +03:00
|
|
|
|
_renderPhaseLoadError() {
|
|
|
|
|
return <div>
|
|
|
|
|
<p>{_t("Unable to query secret storage status")}</p>
|
|
|
|
|
<div className="mx_Dialog_buttons">
|
|
|
|
|
<DialogButtons primaryButton={_t('Retry')}
|
|
|
|
|
onPrimaryButtonClick={this._onLoadRetryClick}
|
|
|
|
|
hasCancel={true}
|
|
|
|
|
onCancel={this._onCancel}
|
|
|
|
|
/>
|
|
|
|
|
</div>
|
|
|
|
|
</div>;
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-29 17:42:07 +03:00
|
|
|
|
_renderPhaseIntro() {
|
2020-06-02 19:55:27 +03:00
|
|
|
|
let cancelButton;
|
|
|
|
|
if (this.props.force) {
|
|
|
|
|
// if this is a forced key reset then aborting will just leave the old keys
|
|
|
|
|
// in place, and is thereforece just 'cancel'
|
|
|
|
|
cancelButton = <button type="button" onClick={this._onCancel}>{_t('Cancel')}</button>;
|
|
|
|
|
} else {
|
|
|
|
|
// if it's setting up from scratch then aborting leaves the user without
|
|
|
|
|
// crypto set up, so they skipping the setup.
|
2020-06-02 20:03:32 +03:00
|
|
|
|
cancelButton = <button type="button"
|
|
|
|
|
className="danger" onClick={this._onSkipSetupClick}
|
|
|
|
|
>{_t('Skip')}</button>;
|
2020-06-02 19:55:27 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-12-05 18:05:28 +03:00
|
|
|
|
return <div>
|
|
|
|
|
<p>{_t(
|
2020-05-29 17:42:07 +03:00
|
|
|
|
"Create a Recovery Key to store encryption keys & secrets with your account data. " +
|
|
|
|
|
"If you lose access to this login you’ll need it to unlock your data.",
|
2019-12-05 18:05:28 +03:00
|
|
|
|
)}</p>
|
2020-05-29 17:42:07 +03:00
|
|
|
|
<div className="mx_Dialog_buttons">
|
|
|
|
|
<DialogButtons primaryButton={_t('Continue')}
|
|
|
|
|
onPrimaryButtonClick={this._onIntroContinueClick}
|
|
|
|
|
hasCancel={false}
|
|
|
|
|
>
|
2020-06-02 19:55:27 +03:00
|
|
|
|
{cancelButton}
|
2020-05-29 17:42:07 +03:00
|
|
|
|
</DialogButtons>
|
|
|
|
|
</div>
|
2019-12-05 18:05:28 +03:00
|
|
|
|
</div>;
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-28 20:15:50 +03:00
|
|
|
|
_renderPhaseSkipConfirm() {
|
2019-12-05 18:05:28 +03:00
|
|
|
|
return <div>
|
|
|
|
|
{_t(
|
2020-01-29 18:48:25 +03:00
|
|
|
|
"Without completing security on this session, it won’t have " +
|
2020-01-28 20:15:50 +03:00
|
|
|
|
"access to encrypted messages.",
|
2019-12-05 18:05:28 +03:00
|
|
|
|
)}
|
2020-01-28 20:15:50 +03:00
|
|
|
|
<DialogButtons primaryButton={_t('Go back')}
|
2020-06-02 19:55:27 +03:00
|
|
|
|
onPrimaryButtonClick={this._onGoBackClick}
|
2019-12-05 18:05:28 +03:00
|
|
|
|
hasCancel={false}
|
|
|
|
|
>
|
2020-01-28 20:15:50 +03:00
|
|
|
|
<button type="button" className="danger" onClick={this._onCancel}>{_t('Skip')}</button>
|
2019-12-05 18:05:28 +03:00
|
|
|
|
</DialogButtons>
|
|
|
|
|
</div>;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
_titleForPhase(phase) {
|
|
|
|
|
switch (phase) {
|
2020-05-29 17:42:07 +03:00
|
|
|
|
case PHASE_INTRO:
|
|
|
|
|
return _t('Create a Recovery Key');
|
2019-12-19 14:26:20 +03:00
|
|
|
|
case PHASE_MIGRATE:
|
2020-01-22 13:44:02 +03:00
|
|
|
|
return _t('Upgrade your encryption');
|
2020-01-28 20:15:50 +03:00
|
|
|
|
case PHASE_CONFIRM_SKIP:
|
|
|
|
|
return _t('Are you sure?');
|
2019-12-05 18:05:28 +03:00
|
|
|
|
case PHASE_SHOWKEY:
|
|
|
|
|
case PHASE_STORING:
|
2020-05-29 17:42:07 +03:00
|
|
|
|
return _t('Store your Recovery Key');
|
2019-12-05 18:05:28 +03:00
|
|
|
|
default:
|
2020-01-22 14:44:47 +03:00
|
|
|
|
return '';
|
2019-12-05 18:05:28 +03:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
render() {
|
|
|
|
|
const BaseDialog = sdk.getComponent('views.dialogs.BaseDialog');
|
|
|
|
|
|
|
|
|
|
let content;
|
|
|
|
|
if (this.state.error) {
|
|
|
|
|
content = <div>
|
|
|
|
|
<p>{_t("Unable to set up secret storage")}</p>
|
|
|
|
|
<div className="mx_Dialog_buttons">
|
|
|
|
|
<DialogButtons primaryButton={_t('Retry')}
|
|
|
|
|
onPrimaryButtonClick={this._bootstrapSecretStorage}
|
|
|
|
|
hasCancel={true}
|
|
|
|
|
onCancel={this._onCancel}
|
|
|
|
|
/>
|
|
|
|
|
</div>
|
|
|
|
|
</div>;
|
|
|
|
|
} else {
|
|
|
|
|
switch (this.state.phase) {
|
2019-12-19 14:26:20 +03:00
|
|
|
|
case PHASE_LOADING:
|
|
|
|
|
content = this._renderBusyPhase();
|
|
|
|
|
break;
|
2020-04-20 20:10:23 +03:00
|
|
|
|
case PHASE_LOADERROR:
|
|
|
|
|
content = this._renderPhaseLoadError();
|
|
|
|
|
break;
|
2020-05-29 17:42:07 +03:00
|
|
|
|
case PHASE_INTRO:
|
|
|
|
|
content = this._renderPhaseIntro();
|
|
|
|
|
break;
|
2019-12-19 14:26:20 +03:00
|
|
|
|
case PHASE_MIGRATE:
|
|
|
|
|
content = this._renderPhaseMigrate();
|
|
|
|
|
break;
|
2019-12-05 18:05:28 +03:00
|
|
|
|
case PHASE_SHOWKEY:
|
|
|
|
|
case PHASE_STORING:
|
2020-05-29 17:42:07 +03:00
|
|
|
|
content = this._renderPhaseShowKey();
|
2019-12-05 18:05:28 +03:00
|
|
|
|
break;
|
2020-01-28 20:15:50 +03:00
|
|
|
|
case PHASE_CONFIRM_SKIP:
|
|
|
|
|
content = this._renderPhaseSkipConfirm();
|
2019-12-05 18:05:28 +03:00
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-22 14:44:47 +03:00
|
|
|
|
let headerImage;
|
|
|
|
|
if (this._titleForPhase(this.state.phase)) {
|
|
|
|
|
headerImage = require("../../../../../res/img/e2e/normal.svg");
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-05 18:05:28 +03:00
|
|
|
|
return (
|
|
|
|
|
<BaseDialog className='mx_CreateSecretStorageDialog'
|
|
|
|
|
onFinished={this.props.onFinished}
|
|
|
|
|
title={this._titleForPhase(this.state.phase)}
|
2020-01-22 14:44:47 +03:00
|
|
|
|
headerImage={headerImage}
|
2020-05-29 17:42:07 +03:00
|
|
|
|
hasCancel={this.props.hasCancel}
|
2020-01-28 19:36:07 +03:00
|
|
|
|
fixedWidth={false}
|
2019-12-05 18:05:28 +03:00
|
|
|
|
>
|
|
|
|
|
<div>
|
|
|
|
|
{content}
|
|
|
|
|
</div>
|
|
|
|
|
</BaseDialog>
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
}
|