element-web/src/IdentityAuthClient.js

195 lines
7.0 KiB
JavaScript
Raw Normal View History

2019-07-29 12:58:47 +02:00
/*
Copyright 2019 The Matrix.org Foundation C.I.C.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
import { SERVICE_TYPES } from 'matrix-js-sdk/src/service-types';
2021-03-19 04:05:51 +01:00
import { createClient } from 'matrix-js-sdk/src/matrix';
2021-06-29 14:11:58 +02:00
import { MatrixClientPeg } from './MatrixClientPeg';
import Modal from './Modal';
import * as sdk from './index';
import { _t } from './languageHandler';
import { Service, startTermsFlow, TermsNotSignedError } from './Terms';
import {
doesAccountDataHaveIdentityServer,
doesIdentityServerHaveTerms,
useDefaultIdentityServer,
} from './utils/IdentityServerUtils';
import { abbreviateUrl } from './utils/UrlUtils';
export class AbortedIdentityActionError extends Error {}
2019-07-29 12:58:47 +02:00
export default class IdentityAuthClient {
/**
* Creates a new identity auth client
* @param {string} identityUrl The URL to contact the identity server with.
* When provided, this class will operate solely within memory, refusing to
* persist any information such as tokens. Default null (not provided).
*/
constructor(identityUrl = null) {
2019-07-29 12:58:47 +02:00
this.accessToken = null;
2019-07-29 15:41:57 +02:00
this.authEnabled = true;
if (identityUrl) {
// XXX: We shouldn't have to create a whole new MatrixClient just to
// do identity server auth. The functions don't take an identity URL
// though, and making all of them take one could lead to developer
// confusion about what the idBaseUrl does on a client. Therefore, we
// just make a new client and live with it.
2019-08-19 18:25:20 +02:00
this.tempClient = createClient({
baseUrl: "", // invalid by design
idBaseUrl: identityUrl,
});
} else {
// Indicates that we're using the real client, not some workaround.
this.tempClient = null;
}
}
get _matrixClient() {
return this.tempClient ? this.tempClient : MatrixClientPeg.get();
}
_writeToken() {
if (this.tempClient) return; // temporary client: ignore
2019-08-16 00:08:18 +02:00
window.localStorage.setItem("mx_is_access_token", this.accessToken);
}
_readToken() {
if (this.tempClient) return null; // temporary client: ignore
return window.localStorage.getItem("mx_is_access_token");
2019-07-29 12:58:47 +02:00
}
hasCredentials() {
return this.accessToken != null; // undef or null
}
// Returns a promise that resolves to the access_token string from the IS
async getAccessToken({ check = true } = {}) {
2019-07-29 15:41:57 +02:00
if (!this.authEnabled) {
// The current IS doesn't support authentication
return null;
}
2019-07-29 12:58:47 +02:00
let token = this.accessToken;
if (!token) {
token = this._readToken();
2019-07-29 12:58:47 +02:00
}
if (!token) {
token = await this.registerForToken(check);
if (token) {
this.accessToken = token;
this._writeToken();
}
return token;
2019-07-29 12:58:47 +02:00
}
if (check) {
try {
await this._checkToken(token);
} catch (e) {
if (
e instanceof TermsNotSignedError ||
e instanceof AbortedIdentityActionError
) {
// Retrying won't help this
throw e;
}
// Retry in case token expired
token = await this.registerForToken();
if (token) {
this.accessToken = token;
this._writeToken();
}
}
2019-07-29 12:58:47 +02:00
}
2019-07-29 15:41:57 +02:00
return token;
2019-07-29 12:58:47 +02:00
}
async _checkToken(token) {
const identityServerUrl = this._matrixClient.getIdentityServerUrl();
try {
await this._matrixClient.getIdentityAccount(token);
} catch (e) {
if (e.errcode === "M_TERMS_NOT_SIGNED") {
console.log("Identity server requires new terms to be agreed to");
await startTermsFlow([new Service(
2019-08-02 15:43:36 +02:00
SERVICE_TYPES.IS,
identityServerUrl,
token,
)]);
return;
}
throw e;
}
2019-07-30 17:56:19 +02:00
if (
!this.tempClient &&
!doesAccountDataHaveIdentityServer() &&
!await doesIdentityServerHaveTerms(identityServerUrl)
) {
const QuestionDialog = sdk.getComponent("dialogs.QuestionDialog");
const { finished } = Modal.createTrackedDialog('Default identity server terms warning', '',
QuestionDialog, {
title: _t("Identity server has no terms of service"),
2019-11-01 17:35:16 +01:00
description: (
<div>
<p>{ _t(
2019-11-01 17:35:16 +01:00
"This action requires accessing the default identity server " +
"<server /> to validate an email address or phone number, " +
"but the server does not have any terms of service.", {},
{
server: () => <b>{ abbreviateUrl(identityServerUrl) }</b>,
2019-11-01 17:35:16 +01:00
},
) }</p>
<p>{ _t(
2019-11-01 17:35:16 +01:00
"Only continue if you trust the owner of the server.",
) }</p>
2019-11-01 17:35:16 +01:00
</div>
),
button: _t("Trust"),
});
const [confirmed] = await finished;
if (confirmed) {
2021-01-20 14:49:15 +01:00
// eslint-disable-next-line react-hooks/rules-of-hooks
useDefaultIdentityServer();
} else {
throw new AbortedIdentityActionError(
"User aborted identity server action without terms",
);
}
}
// We should ensure the token in `localStorage` is cleared
2019-07-30 11:09:38 +02:00
// appropriately. We already clear storage on sign out, but we'll need
// additional clearing when changing ISes in settings as part of future
// privacy work.
// See also https://github.com/vector-im/element-web/issues/10455.
2019-07-29 12:58:47 +02:00
}
async registerForToken(check=true) {
const hsOpenIdToken = await MatrixClientPeg.get().getOpenIdToken();
// XXX: The spec is `token`, but we used `access_token` for a Sydent release.
const { access_token: accessToken, token } =
await this._matrixClient.registerWithIdentityServer(hsOpenIdToken);
const identityAccessToken = token ? token : accessToken;
if (check) await this._checkToken(identityAccessToken);
return identityAccessToken;
2019-07-29 12:58:47 +02:00
}
}