David Baker
e0a34d9dea
Revert "Use recovery keys over passphrases"
2020-06-18 09:35:11 +01:00
David Baker
b82a893a79
Merge remote-tracking branch 'origin/develop' into dbkr/recovery_keys_over_passphrases
2020-06-05 16:00:43 +01:00
Bruno Windels
07e0cab4a8
When trying to restore a keyback that has its key in 4S, check if 4S will be readable
...
If the account data for the 4S key is cleared or lost somehow, don't attempt to
read the key and ask for the passphrase/recovery key instead, as doing so would trigger another
bootstrap from the restore key backup dialog, overwriting the existing key backup.
2020-06-04 12:52:20 +02:00
David Baker
6f3bfc96ca
Merge remote-tracking branch 'origin/develop' into dbkr/recovery_keys_over_passphrases
2020-06-03 11:01:43 +01:00
David Baker
e06ba2003b
Prompt for recovery key on login rather than passphrase
...
Only show passphrase options at all if the user has a passphrase on
their SSSS key.
2020-06-02 16:32:15 +01:00
Michael Telatynski
cc68f53fc2
tidy up and delint
...
Signed-off-by: Michael Telatynski <7t3chguy@gmail.com>
2020-05-27 10:47:01 +01:00
Michael Telatynski
2b432b0d82
Remove feature_cross_signing
...
Signed-off-by: Michael Telatynski <7t3chguy@gmail.com>
2020-05-27 10:28:25 +01:00
David Baker
5d1c01fd6f
Fix key backup restore with SSSS
...
The room / session ID params come after the backupInfo for restoring
from SSSS so the options object was being passed into the wrong param.
Roll on TypeScript.
This meant restoring backups worked fine when the key was cached but
failed when it wasn't.
Regressed in https://github.com/matrix-org/matrix-react-sdk/pull/4507
2020-05-21 12:26:27 +01:00
David Baker
6486c74909
Fix passphrase reset in key backup restore dialog
...
We prompt to restore the key backup when bootstrapping if it's not
trusted, but the 'set up new recovery options' in this dialog just
sets up a new key backup which just goes back to trying to access
SSSS if cross-signing is enabled. This makes it reset the SSSS
passphase instead.
Fixes https://github.com/vector-im/riot-web/issues/13578
2020-05-11 14:21:59 +01:00
Zoe
465442c31e
fragments and i18n don't play nice together
2020-04-29 15:13:24 +01:00
Zoe
326d567468
Fixed the dialog height
2020-04-29 14:29:36 +01:00
Zoe
62c73146dc
copy changes
2020-04-29 14:14:39 +01:00
Zoe
9d1c73348c
Show progress when loading keys
2020-04-28 11:32:51 +01:00
Michael Telatynski
a9a2999ccc
Use recovery passphrase
and recovery key
everywhere
...
Signed-off-by: Michael Telatynski <7t3chguy@gmail.com>
2020-04-16 12:26:12 +01:00
Zoe
936a4a0022
lint
2020-03-25 11:47:07 +00:00
Zoe
8b2ae3e20f
If cached keys are present in the key backup dialog, use them
2020-03-25 11:41:59 +00:00
David Baker
c8691c73ff
Allow key backup restore to get the key backup passphrase
...
And pass this in as the new callback to bootstrap to get the old
key backup passphrase.
2020-03-19 20:42:16 +00:00
Michael Telatynski
4d0d6cdaa4
Merge branch 'develop' into t3chguy/password_completion
2020-02-05 20:24:37 +00:00
J. Ryan Stinnett
02cada7cc6
First pass of copy changes
2020-01-31 12:15:19 +00:00
Michael Telatynski
920daa3125
Get rid of custom enter handling and protect handlers, disabling button isn't foolproof
...
Signed-off-by: Michael Telatynski <7t3chguy@gmail.com>
2020-01-29 13:43:08 +00:00
Michael Telatynski
fe71fe6033
Sprinkle forms and new-password designators to make autofill and password completion less wild
...
Signed-off-by: Michael Telatynski <7t3chguy@gmail.com>
2020-01-29 13:38:50 +00:00
David Baker
abfa593791
Make the 'encryption upgrade' flow better
...
Fixes https://github.com/vector-im/riot-web/issues/12086
2020-01-28 16:36:07 +00:00
David Baker
3d7137d4ad
Setup flow for cross-signing on login / registration
...
Still outstanding:
* Keep password from login / registration
* Confirmation on skip button
Fixes https://github.com/vector-im/riot-web/issues/11902
2020-01-24 19:11:57 +00:00
Travis Ralston
3e5cc9550b
Fix import merge conflicts, removing any that aren't needed anymore
...
Many imports were removed as part of refactoring work, so here we are.
2020-01-09 14:17:33 -07:00
Travis Ralston
fde32f13a5
[CONFLICT CHUNKS] Merge branch 'develop' into travis/sourcemaps-develop
2020-01-09 14:15:09 -07:00
J. Ryan Stinnett
b8683462e8
Update backup creation paths for SSSS
...
This updates the various backup creation entry points to ensure they support
creating with secret storage if the feature flag is enabled.
2020-01-03 15:34:05 +00:00
J. Ryan Stinnett
99559c5121
Update backup restore paths for SSSS
...
This updates all the various key backup entry points to ensure they use a flow
that supports backups stored under secret storage.
2020-01-03 13:33:36 +00:00
Travis Ralston
042bd35d79
Fix MatrixClientPeg imports
2019-12-22 21:15:54 -07:00
Travis Ralston
d56f0f2a25
Convert many imports to handle ES6 exports
...
Reliant upon https://github.com/matrix-org/matrix-react-sdk/pull/3761
2019-12-22 21:04:42 -07:00
J. Ryan Stinnett
9f1c2cd3e1
Add dialogs for creating and accessing secret storage
...
This adds dialogs for creating and accessing secret storage via a passphrase or
recovery key. These flows are adapted from the ones used for key backup.
2019-12-05 15:34:07 +00:00
J. Ryan Stinnett
a7d94ebcaa
Convert RestoreKeyBackupDialog to modern style
2019-12-04 17:23:48 +00:00
Michael Telatynski
58317b1608
Use Keyboard Key variables instead of hardcoded strings
...
Signed-off-by: Michael Telatynski <7t3chguy@gmail.com>
2019-10-09 19:59:11 +01:00
Michael Telatynski
d94e2179bf
Migrate away from React.createClass for views/dialogs. React 16 :D
...
Signed-off-by: Michael Telatynski <7t3chguy@gmail.com>
2019-08-24 11:59:46 +01:00
David Baker
e41fc55cca
Add warnings about trusted computers
2019-02-12 16:34:06 +00:00
David Baker
d1e2418b75
Use error constant from the class
2019-02-08 10:43:39 +00:00
David Baker
f79b777dd4
Trust on decrypt
...
Add support for trust-on-decrypt (API change, recognise flag on
isKeyBackupTrusted). Catch rejection on wrong passphrase / recovery
key. Fix remembering whether we are restoring with key or passphrase.
Requires https://github.com/matrix-org/matrix-js-sdk/pull/836
2019-02-07 14:39:47 +00:00
David Baker
ce565f109a
Key Backup: Don't fail if no keys
...
Only fail if there were any keys in the backup (which does mean
that the backup will always succeed if there aren't any keys which
could also be misleading, but is probably not as bad and can probably
be fixed with Trust on Decrypt).
Also cheekily fix the error message so it talks about passphrases
if you used a passphrase and recovery keys if you used a recovery key.
2019-02-06 18:03:47 +00:00
David Baker
31889ecfad
Lint
2019-01-21 19:07:44 +00:00
David Baker
e42b0a9972
Make error string less redundant
2019-01-21 18:02:09 +00:00
David Baker
1a9c3f1ac7
Make error string less technical
2019-01-21 17:41:55 +00:00
David Baker
0a2b79b62d
Error if no sessions decrypted
...
Tell the user if they entered the wrong recovery key
Fixes https://github.com/vector-im/riot-web/issues/8143
2019-01-21 16:51:30 +00:00
David Baker
4f8c4f1c6e
Make create key backup dialog async
...
So we can add zxcvbn to it without inflating the main bundle size
2018-11-23 10:55:18 +00:00
David Baker
d443d6173d
Forgot to enable continue button on download
2018-11-22 19:06:58 +00:00
David Baker
b529c98095
Merge pull request #2284 from matrix-org/dbkr/e2e_backups_download_recovery_key
...
Add recovery key download button
2018-11-21 18:25:33 +00:00
David Baker
3828798099
lint
2018-11-21 18:17:26 +00:00
David Baker
40ef2e0cf4
another missed translation
2018-11-21 18:08:44 +00:00
David Baker
1c06d781ae
Missed translation
2018-11-21 18:06:37 +00:00
David Baker
08e2ba8c6c
Don't allow enter to submit if field invalid
2018-11-21 18:02:58 +00:00
David Baker
ed5d87e797
Add recovery key download button
2018-11-21 13:57:31 +00:00
David Baker
63a7ff5273
lint
2018-11-20 16:20:31 +00:00