2016-01-19 19:36:54 +03:00
|
|
|
/*
|
|
|
|
Copyright 2016 OpenMarket Ltd
|
2017-03-16 17:56:26 +03:00
|
|
|
Copyright 2017 Vector Creations Ltd
|
2019-09-19 17:50:18 +03:00
|
|
|
Copyright 2019 The Matrix.org Foundation C.I.C.
|
2016-01-19 19:36:54 +03:00
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2019-12-21 00:13:46 +03:00
|
|
|
import {MatrixClientPeg} from './MatrixClientPeg';
|
2019-12-20 04:19:56 +03:00
|
|
|
import * as sdk from './index';
|
2019-10-08 20:56:13 +03:00
|
|
|
import Modal from './Modal';
|
2017-05-25 13:39:08 +03:00
|
|
|
import { _t } from './languageHandler';
|
2019-07-29 17:34:50 +03:00
|
|
|
import IdentityAuthClient from './IdentityAuthClient';
|
2020-03-31 05:18:52 +03:00
|
|
|
import {SSOAuthEntry} from "./components/views/auth/InteractiveAuthEntryComponents";
|
2016-01-19 19:36:54 +03:00
|
|
|
|
2019-10-07 18:43:17 +03:00
|
|
|
function getIdServerDomain() {
|
|
|
|
return MatrixClientPeg.get().idBaseUrl.split("://")[1];
|
|
|
|
}
|
|
|
|
|
2016-01-19 19:36:54 +03:00
|
|
|
/**
|
2019-02-01 03:52:39 +03:00
|
|
|
* Allows a user to add a third party identifier to their homeserver and,
|
2016-01-19 19:36:54 +03:00
|
|
|
* optionally, the identity servers.
|
|
|
|
*
|
|
|
|
* This involves getting an email token from the identity server to "prove" that
|
2017-01-20 17:22:27 +03:00
|
|
|
* the client owns the given email address, which is then passed to the
|
2016-01-19 19:36:54 +03:00
|
|
|
* add threepid API on the homeserver.
|
2019-09-20 13:49:32 +03:00
|
|
|
*
|
|
|
|
* Diagrams of the intended API flows here are available at:
|
|
|
|
*
|
|
|
|
* https://gist.github.com/jryans/839a09bf0c5a70e2f36ed990d50ed928
|
2016-01-19 19:36:54 +03:00
|
|
|
*/
|
2019-01-23 01:18:14 +03:00
|
|
|
export default class AddThreepid {
|
2016-01-19 19:36:54 +03:00
|
|
|
constructor() {
|
|
|
|
this.clientSecret = MatrixClientPeg.get().generateClientSecret();
|
2019-09-23 14:21:25 +03:00
|
|
|
this.sessionId = null;
|
|
|
|
this.submitUrl = null;
|
2016-01-19 19:36:54 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2019-09-19 17:50:18 +03:00
|
|
|
* Attempt to add an email threepid to the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an email to the provided email address.
|
2016-01-19 19:36:54 +03:00
|
|
|
* @param {string} emailAddress The email address to add
|
|
|
|
* @return {Promise} Resolves when the email has been sent. Then call checkEmailLinkClicked().
|
|
|
|
*/
|
2019-09-19 17:50:18 +03:00
|
|
|
addEmailAddress(emailAddress) {
|
2016-07-08 19:53:06 +03:00
|
|
|
return MatrixClientPeg.get().requestAdd3pidEmailToken(emailAddress, this.clientSecret, 1).then((res) => {
|
2016-01-19 19:36:54 +03:00
|
|
|
this.sessionId = res.sid;
|
|
|
|
return res;
|
|
|
|
}, function(err) {
|
2017-07-01 16:21:28 +03:00
|
|
|
if (err.errcode === 'M_THREEPID_IN_USE') {
|
2017-05-23 17:16:31 +03:00
|
|
|
err.message = _t('This email address is already in use');
|
2016-07-08 19:28:04 +03:00
|
|
|
} else if (err.httpStatus) {
|
2016-01-19 19:36:54 +03:00
|
|
|
err.message = err.message + ` (Status ${err.httpStatus})`;
|
|
|
|
}
|
|
|
|
throw err;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2017-03-16 17:56:26 +03:00
|
|
|
/**
|
2019-09-19 17:50:18 +03:00
|
|
|
* Attempt to bind an email threepid on the identity server via the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an email to the provided email address.
|
|
|
|
* @param {string} emailAddress The email address to add
|
|
|
|
* @return {Promise} Resolves when the email has been sent. Then call checkEmailLinkClicked().
|
|
|
|
*/
|
2019-09-20 13:49:32 +03:00
|
|
|
async bindEmailAddress(emailAddress) {
|
2019-09-19 17:50:18 +03:00
|
|
|
this.bind = true;
|
2019-09-20 13:49:32 +03:00
|
|
|
if (await MatrixClientPeg.get().doesServerSupportSeparateAddAndBind()) {
|
|
|
|
// For separate bind, request a token directly from the IS.
|
|
|
|
const authClient = new IdentityAuthClient();
|
|
|
|
const identityAccessToken = await authClient.getAccessToken();
|
|
|
|
return MatrixClientPeg.get().requestEmailToken(
|
|
|
|
emailAddress, this.clientSecret, 1,
|
|
|
|
undefined, undefined, identityAccessToken,
|
|
|
|
).then((res) => {
|
|
|
|
this.sessionId = res.sid;
|
|
|
|
return res;
|
|
|
|
}, function(err) {
|
|
|
|
if (err.errcode === 'M_THREEPID_IN_USE') {
|
|
|
|
err.message = _t('This email address is already in use');
|
|
|
|
} else if (err.httpStatus) {
|
|
|
|
err.message = err.message + ` (Status ${err.httpStatus})`;
|
|
|
|
}
|
|
|
|
throw err;
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
// For tangled bind, request a token via the HS.
|
|
|
|
return this.addEmailAddress(emailAddress);
|
|
|
|
}
|
2019-09-19 17:50:18 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Attempt to add a MSISDN threepid to the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an SMS to the provided phone number.
|
2017-03-22 15:00:16 +03:00
|
|
|
* @param {string} phoneCountry The ISO 2 letter code of the country to resolve phoneNumber in
|
|
|
|
* @param {string} phoneNumber The national or international formatted phone number to add
|
2017-03-16 17:56:26 +03:00
|
|
|
* @return {Promise} Resolves when the text message has been sent. Then call haveMsisdnToken().
|
|
|
|
*/
|
2019-09-19 17:50:18 +03:00
|
|
|
addMsisdn(phoneCountry, phoneNumber) {
|
2017-03-16 17:56:26 +03:00
|
|
|
return MatrixClientPeg.get().requestAdd3pidMsisdnToken(
|
|
|
|
phoneCountry, phoneNumber, this.clientSecret, 1,
|
|
|
|
).then((res) => {
|
|
|
|
this.sessionId = res.sid;
|
2019-09-23 14:21:25 +03:00
|
|
|
this.submitUrl = res.submit_url;
|
2017-03-16 17:56:26 +03:00
|
|
|
return res;
|
|
|
|
}, function(err) {
|
2017-07-01 16:21:28 +03:00
|
|
|
if (err.errcode === 'M_THREEPID_IN_USE') {
|
2017-05-23 17:16:31 +03:00
|
|
|
err.message = _t('This phone number is already in use');
|
2017-03-16 17:56:26 +03:00
|
|
|
} else if (err.httpStatus) {
|
|
|
|
err.message = err.message + ` (Status ${err.httpStatus})`;
|
|
|
|
}
|
|
|
|
throw err;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2019-09-19 17:50:18 +03:00
|
|
|
/**
|
|
|
|
* Attempt to bind a MSISDN threepid on the identity server via the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an SMS to the provided phone number.
|
|
|
|
* @param {string} phoneCountry The ISO 2 letter code of the country to resolve phoneNumber in
|
|
|
|
* @param {string} phoneNumber The national or international formatted phone number to add
|
|
|
|
* @return {Promise} Resolves when the text message has been sent. Then call haveMsisdnToken().
|
|
|
|
*/
|
2019-09-20 14:45:22 +03:00
|
|
|
async bindMsisdn(phoneCountry, phoneNumber) {
|
2019-09-19 17:50:18 +03:00
|
|
|
this.bind = true;
|
2019-09-20 14:45:22 +03:00
|
|
|
if (await MatrixClientPeg.get().doesServerSupportSeparateAddAndBind()) {
|
|
|
|
// For separate bind, request a token directly from the IS.
|
|
|
|
const authClient = new IdentityAuthClient();
|
|
|
|
const identityAccessToken = await authClient.getAccessToken();
|
|
|
|
return MatrixClientPeg.get().requestMsisdnToken(
|
|
|
|
phoneCountry, phoneNumber, this.clientSecret, 1,
|
|
|
|
undefined, undefined, identityAccessToken,
|
|
|
|
).then((res) => {
|
|
|
|
this.sessionId = res.sid;
|
|
|
|
return res;
|
|
|
|
}, function(err) {
|
|
|
|
if (err.errcode === 'M_THREEPID_IN_USE') {
|
|
|
|
err.message = _t('This phone number is already in use');
|
|
|
|
} else if (err.httpStatus) {
|
|
|
|
err.message = err.message + ` (Status ${err.httpStatus})`;
|
|
|
|
}
|
|
|
|
throw err;
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
// For tangled bind, request a token via the HS.
|
|
|
|
return this.addMsisdn(phoneCountry, phoneNumber);
|
|
|
|
}
|
2019-09-19 17:50:18 +03:00
|
|
|
}
|
|
|
|
|
2016-01-19 19:36:54 +03:00
|
|
|
/**
|
|
|
|
* Checks if the email link has been clicked by attempting to add the threepid
|
2017-03-16 17:56:26 +03:00
|
|
|
* @return {Promise} Resolves if the email address was added. Rejects with an object
|
2016-01-19 19:36:54 +03:00
|
|
|
* with a "message" property which contains a human-readable message detailing why
|
2017-03-16 17:56:26 +03:00
|
|
|
* the request failed.
|
2016-01-19 19:36:54 +03:00
|
|
|
*/
|
2019-09-20 13:49:32 +03:00
|
|
|
async checkEmailLinkClicked() {
|
|
|
|
try {
|
|
|
|
if (await MatrixClientPeg.get().doesServerSupportSeparateAddAndBind()) {
|
|
|
|
if (this.bind) {
|
|
|
|
const authClient = new IdentityAuthClient();
|
|
|
|
const identityAccessToken = await authClient.getAccessToken();
|
|
|
|
await MatrixClientPeg.get().bindThreePid({
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
2019-10-07 18:43:17 +03:00
|
|
|
id_server: getIdServerDomain(),
|
2019-09-20 13:49:32 +03:00
|
|
|
id_access_token: identityAccessToken,
|
|
|
|
});
|
|
|
|
} else {
|
2019-10-08 20:56:13 +03:00
|
|
|
try {
|
|
|
|
await this._makeAddThreepidOnlyRequest();
|
|
|
|
|
|
|
|
// The spec has always required this to use UI auth but synapse briefly
|
|
|
|
// implemented it without, so this may just succeed and that's OK.
|
|
|
|
return;
|
|
|
|
} catch (e) {
|
|
|
|
if (e.httpStatus !== 401 || !e.data || !e.data.flows) {
|
|
|
|
// doesn't look like an interactive-auth failure
|
|
|
|
throw e;
|
|
|
|
}
|
|
|
|
|
|
|
|
// pop up an interactive auth dialog
|
|
|
|
const InteractiveAuthDialog = sdk.getComponent("dialogs.InteractiveAuthDialog");
|
|
|
|
|
2020-03-31 05:18:52 +03:00
|
|
|
|
|
|
|
const dialogAesthetics = {
|
|
|
|
[SSOAuthEntry.PHASE_PREAUTH]: {
|
|
|
|
title: _t("Use Single Sign On to continue"),
|
2020-03-31 05:24:53 +03:00
|
|
|
body: _t("Confirm adding this email address by using " +
|
|
|
|
"Single Sign On to prove your identity."),
|
2020-03-31 05:18:52 +03:00
|
|
|
continueText: _t("Single Sign On"),
|
|
|
|
continueKind: "primary",
|
|
|
|
},
|
|
|
|
[SSOAuthEntry.PHASE_POSTAUTH]: {
|
|
|
|
title: _t("Confirm adding email"),
|
|
|
|
body: _t("Click the button below to confirm adding this email address."),
|
|
|
|
continueText: _t("Confirm"),
|
|
|
|
continueKind: "primary",
|
|
|
|
},
|
|
|
|
};
|
2019-10-09 13:30:44 +03:00
|
|
|
const { finished } = Modal.createTrackedDialog('Add Email', '', InteractiveAuthDialog, {
|
2019-10-09 13:28:16 +03:00
|
|
|
title: _t("Add Email Address"),
|
|
|
|
matrixClient: MatrixClientPeg.get(),
|
|
|
|
authData: e.data,
|
|
|
|
makeRequest: this._makeAddThreepidOnlyRequest,
|
2020-03-31 05:18:52 +03:00
|
|
|
aestheticsForStagePhases: {
|
|
|
|
[SSOAuthEntry.LOGIN_TYPE]: dialogAesthetics,
|
|
|
|
[SSOAuthEntry.UNSTABLE_LOGIN_TYPE]: dialogAesthetics,
|
|
|
|
},
|
2019-10-08 20:56:13 +03:00
|
|
|
});
|
2019-10-09 13:30:44 +03:00
|
|
|
return finished;
|
2019-10-08 20:56:13 +03:00
|
|
|
}
|
2019-09-20 13:49:32 +03:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
await MatrixClientPeg.get().addThreePid({
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
2019-10-07 18:43:17 +03:00
|
|
|
id_server: getIdServerDomain(),
|
2019-09-20 13:49:32 +03:00
|
|
|
}, this.bind);
|
|
|
|
}
|
|
|
|
} catch (err) {
|
2016-01-19 19:36:54 +03:00
|
|
|
if (err.httpStatus === 401) {
|
2017-05-23 17:16:31 +03:00
|
|
|
err.message = _t('Failed to verify email address: make sure you clicked the link in the email');
|
2017-07-01 16:21:28 +03:00
|
|
|
} else if (err.httpStatus) {
|
2016-01-19 19:36:54 +03:00
|
|
|
err.message += ` (Status ${err.httpStatus})`;
|
|
|
|
}
|
|
|
|
throw err;
|
2019-09-20 13:49:32 +03:00
|
|
|
}
|
2016-01-19 19:36:54 +03:00
|
|
|
}
|
2017-03-16 17:56:26 +03:00
|
|
|
|
2019-10-08 20:56:13 +03:00
|
|
|
/**
|
|
|
|
* @param {Object} auth UI auth object
|
|
|
|
* @return {Promise<Object>} Response from /3pid/add call (in current spec, an empty object)
|
|
|
|
*/
|
|
|
|
_makeAddThreepidOnlyRequest = (auth) => {
|
|
|
|
return MatrixClientPeg.get().addThreePidOnly({
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
|
|
|
auth,
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2017-03-16 17:56:26 +03:00
|
|
|
/**
|
|
|
|
* Takes a phone number verification code as entered by the user and validates
|
|
|
|
* it with the ID server, then if successful, adds the phone number.
|
2019-07-29 17:34:50 +03:00
|
|
|
* @param {string} msisdnToken phone number verification code as entered by the user
|
2017-03-22 15:00:16 +03:00
|
|
|
* @return {Promise} Resolves if the phone number was added. Rejects with an object
|
2017-03-16 17:56:26 +03:00
|
|
|
* with a "message" property which contains a human-readable message detailing why
|
|
|
|
* the request failed.
|
|
|
|
*/
|
2019-07-29 17:34:50 +03:00
|
|
|
async haveMsisdnToken(msisdnToken) {
|
|
|
|
const authClient = new IdentityAuthClient();
|
2019-10-31 17:50:21 +03:00
|
|
|
const supportsSeparateAddAndBind =
|
|
|
|
await MatrixClientPeg.get().doesServerSupportSeparateAddAndBind();
|
2019-09-23 14:21:25 +03:00
|
|
|
|
|
|
|
let result;
|
|
|
|
if (this.submitUrl) {
|
|
|
|
result = await MatrixClientPeg.get().submitMsisdnTokenOtherUrl(
|
|
|
|
this.submitUrl,
|
|
|
|
this.sessionId,
|
|
|
|
this.clientSecret,
|
|
|
|
msisdnToken,
|
|
|
|
);
|
2019-10-31 17:50:21 +03:00
|
|
|
} else if (this.bind || !supportsSeparateAddAndBind) {
|
2019-09-23 14:21:25 +03:00
|
|
|
result = await MatrixClientPeg.get().submitMsisdnToken(
|
|
|
|
this.sessionId,
|
|
|
|
this.clientSecret,
|
|
|
|
msisdnToken,
|
2019-09-23 14:28:41 +03:00
|
|
|
await authClient.getAccessToken(),
|
2019-09-23 14:21:25 +03:00
|
|
|
);
|
2019-10-31 17:50:21 +03:00
|
|
|
} else {
|
|
|
|
throw new Error("The add / bind with MSISDN flow is misconfigured");
|
2019-09-23 14:21:25 +03:00
|
|
|
}
|
2019-07-29 17:31:21 +03:00
|
|
|
if (result.errcode) {
|
|
|
|
throw result;
|
|
|
|
}
|
|
|
|
|
2019-10-31 17:50:21 +03:00
|
|
|
if (supportsSeparateAddAndBind) {
|
2019-09-20 14:45:22 +03:00
|
|
|
if (this.bind) {
|
|
|
|
await MatrixClientPeg.get().bindThreePid({
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
2019-10-08 09:43:40 +03:00
|
|
|
id_server: getIdServerDomain(),
|
2019-09-23 14:28:41 +03:00
|
|
|
id_access_token: await authClient.getAccessToken(),
|
2019-09-20 14:45:22 +03:00
|
|
|
});
|
|
|
|
} else {
|
2019-10-08 21:07:39 +03:00
|
|
|
try {
|
|
|
|
await this._makeAddThreepidOnlyRequest();
|
|
|
|
|
|
|
|
// The spec has always required this to use UI auth but synapse briefly
|
|
|
|
// implemented it without, so this may just succeed and that's OK.
|
|
|
|
return;
|
|
|
|
} catch (e) {
|
|
|
|
if (e.httpStatus !== 401 || !e.data || !e.data.flows) {
|
|
|
|
// doesn't look like an interactive-auth failure
|
|
|
|
throw e;
|
|
|
|
}
|
|
|
|
|
|
|
|
// pop up an interactive auth dialog
|
|
|
|
const InteractiveAuthDialog = sdk.getComponent("dialogs.InteractiveAuthDialog");
|
|
|
|
|
2020-03-31 05:18:52 +03:00
|
|
|
const dialogAesthetics = {
|
|
|
|
[SSOAuthEntry.PHASE_PREAUTH]: {
|
|
|
|
title: _t("Use Single Sign On to continue"),
|
2020-03-31 05:24:53 +03:00
|
|
|
body: _t("Confirm adding this phone number by using " +
|
|
|
|
"Single Sign On to prove your identity."),
|
2020-03-31 05:18:52 +03:00
|
|
|
continueText: _t("Single Sign On"),
|
|
|
|
continueKind: "primary",
|
|
|
|
},
|
|
|
|
[SSOAuthEntry.PHASE_POSTAUTH]: {
|
|
|
|
title: _t("Confirm adding phone number"),
|
|
|
|
body: _t("Click the button below to confirm adding this phone number."),
|
|
|
|
continueText: _t("Confirm"),
|
|
|
|
continueKind: "primary",
|
|
|
|
},
|
|
|
|
};
|
2019-10-09 13:30:44 +03:00
|
|
|
const { finished } = Modal.createTrackedDialog('Add MSISDN', '', InteractiveAuthDialog, {
|
2019-10-09 13:28:16 +03:00
|
|
|
title: _t("Add Phone Number"),
|
|
|
|
matrixClient: MatrixClientPeg.get(),
|
|
|
|
authData: e.data,
|
|
|
|
makeRequest: this._makeAddThreepidOnlyRequest,
|
2020-03-31 05:18:52 +03:00
|
|
|
aestheticsForStagePhases: {
|
|
|
|
[SSOAuthEntry.LOGIN_TYPE]: dialogAesthetics,
|
|
|
|
[SSOAuthEntry.UNSTABLE_LOGIN_TYPE]: dialogAesthetics,
|
|
|
|
},
|
2019-10-08 21:07:39 +03:00
|
|
|
});
|
2019-10-09 13:30:44 +03:00
|
|
|
return finished;
|
2019-10-08 21:07:39 +03:00
|
|
|
}
|
2019-09-20 14:45:22 +03:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
await MatrixClientPeg.get().addThreePid({
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
2019-10-08 09:43:40 +03:00
|
|
|
id_server: getIdServerDomain(),
|
2019-09-20 14:45:22 +03:00
|
|
|
}, this.bind);
|
|
|
|
}
|
2017-03-16 17:56:26 +03:00
|
|
|
}
|
2016-01-19 19:36:54 +03:00
|
|
|
}
|