/* Copyright 2018, 2019 New Vector Ltd Copyright 2019, 2020 The Matrix.org Foundation C.I.C. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ import React, {createRef} from 'react'; import FileSaver from 'file-saver'; import * as sdk from '../../../../index'; import {MatrixClientPeg} from '../../../../MatrixClientPeg'; import PropTypes from 'prop-types'; import {_t, _td} from '../../../../languageHandler'; import { accessSecretStorage } from '../../../../CrossSigningManager'; import SettingsStore from '../../../../settings/SettingsStore'; import AccessibleButton from "../../../../components/views/elements/AccessibleButton"; import {copyNode} from "../../../../utils/strings"; import PassphraseField from "../../../../components/views/auth/PassphraseField"; const PHASE_PASSPHRASE = 0; const PHASE_PASSPHRASE_CONFIRM = 1; const PHASE_SHOWKEY = 2; const PHASE_KEEPITSAFE = 3; const PHASE_BACKINGUP = 4; const PHASE_DONE = 5; const PHASE_OPTOUT_CONFIRM = 6; const PASSWORD_MIN_SCORE = 4; // So secure, many characters, much complex, wow, etc, etc. /* * Walks the user through the process of creating an e2e key backup * on the server. */ export default class CreateKeyBackupDialog extends React.PureComponent { static propTypes = { onFinished: PropTypes.func.isRequired, } constructor(props) { super(props); this._recoveryKeyNode = null; this._keyBackupInfo = null; this.state = { secureSecretStorage: null, phase: PHASE_PASSPHRASE, passPhrase: '', passPhraseValid: false, passPhraseConfirm: '', copied: false, downloaded: false, }; this._passphraseField = createRef(); } async componentDidMount() { const cli = MatrixClientPeg.get(); const secureSecretStorage = ( SettingsStore.getValue("feature_cross_signing") && await cli.doesServerSupportUnstableFeature("org.matrix.e2e_cross_signing") ); this.setState({ secureSecretStorage }); // If we're using secret storage, skip ahead to the backing up step, as // `accessSecretStorage` will handle passphrases as needed. if (secureSecretStorage) { this.setState({ phase: PHASE_BACKINGUP }); this._createBackup(); } } _collectRecoveryKeyNode = (n) => { this._recoveryKeyNode = n; } _onCopyClick = () => { const successful = copyNode(this._recoveryKeyNode); if (successful) { this.setState({ copied: true, phase: PHASE_KEEPITSAFE, }); } } _onDownloadClick = () => { const blob = new Blob([this._keyBackupInfo.recovery_key], { type: 'text/plain;charset=us-ascii', }); FileSaver.saveAs(blob, 'recovery-key.txt'); this.setState({ downloaded: true, phase: PHASE_KEEPITSAFE, }); } _createBackup = async () => { const { secureSecretStorage } = this.state; this.setState({ phase: PHASE_BACKINGUP, error: null, }); let info; try { if (secureSecretStorage) { await accessSecretStorage(async () => { info = await MatrixClientPeg.get().prepareKeyBackupVersion( null /* random key */, { secureSecretStorage: true }, ); info = await MatrixClientPeg.get().createKeyBackupVersion(info); }); } else { info = await MatrixClientPeg.get().createKeyBackupVersion( this._keyBackupInfo, ); } await MatrixClientPeg.get().scheduleAllGroupSessionsForBackup(); this.setState({ phase: PHASE_DONE, }); } catch (e) { console.error("Error creating key backup", e); // TODO: If creating a version succeeds, but backup fails, should we // delete the version, disable backup, or do nothing? If we just // disable without deleting, we'll enable on next app reload since // it is trusted. if (info) { MatrixClientPeg.get().deleteKeyBackupVersion(info.version); } this.setState({ error: e, }); } } _onCancel = () => { this.props.onFinished(false); } _onDone = () => { this.props.onFinished(true); } _onOptOutClick = () => { this.setState({phase: PHASE_OPTOUT_CONFIRM}); } _onSetUpClick = () => { this.setState({phase: PHASE_PASSPHRASE}); } _onSkipPassPhraseClick = async () => { this._keyBackupInfo = await MatrixClientPeg.get().prepareKeyBackupVersion(); this.setState({ copied: false, downloaded: false, phase: PHASE_SHOWKEY, }); } _onPassPhraseNextClick = async (e) => { e.preventDefault(); if (!this._passphraseField.current) return; // unmounting await this._passphraseField.current.validate({ allowEmpty: false }); if (!this._passphraseField.current.state.valid) { this._passphraseField.current.focus(); this._passphraseField.current.validate({ allowEmpty: false, focused: true }); return; } this.setState({phase: PHASE_PASSPHRASE_CONFIRM}); }; _onPassPhraseConfirmNextClick = async (e) => { e.preventDefault(); if (this.state.passPhrase !== this.state.passPhraseConfirm) return; this._keyBackupInfo = await MatrixClientPeg.get().prepareKeyBackupVersion(this.state.passPhrase); this.setState({ copied: false, downloaded: false, phase: PHASE_SHOWKEY, }); }; _onSetAgainClick = () => { this.setState({ passPhrase: '', passPhraseValid: false, passPhraseConfirm: '', phase: PHASE_PASSPHRASE, }); } _onKeepItSafeBackClick = () => { this.setState({ phase: PHASE_SHOWKEY, }); } _onPassPhraseValidate = (result) => { this.setState({ passPhraseValid: result.valid, }); }; _onPassPhraseChange = (e) => { this.setState({ passPhrase: e.target.value, }); } _onPassPhraseConfirmChange = (e) => { this.setState({ passPhraseConfirm: e.target.value, }); } _renderPhasePassPhrase() { const DialogButtons = sdk.getComponent('views.elements.DialogButtons'); return
; } _renderPhasePassPhraseConfirm() { const AccessibleButton = sdk.getComponent('elements.AccessibleButton'); let matchText; if (this.state.passPhraseConfirm === this.state.passPhrase) { matchText = _t("That matches!"); } else if (!this.state.passPhrase.startsWith(this.state.passPhraseConfirm)) { // only tell them they're wrong if they've actually gone wrong. // Security concious readers will note that if you left riot-web unattended // on this screen, this would make it easy for a malicious person to guess // your passphrase one letter at a time, but they could get this faster by // just opening the browser's developer tools and reading it. // Note that not having typed anything at all will not hit this clause and // fall through so empty box === no hint. matchText = _t("That doesn't match."); } let passPhraseMatch = null; if (matchText) { passPhraseMatch ={_t( "Your recovery key is a safety net - you can use it to restore " + "access to your encrypted messages if you forget your recovery passphrase.", )}
{_t( "Keep a copy of it somewhere secure, like a password manager or even a safe.", )}
{this._keyBackupInfo.recovery_key}
{_t( "Your keys are being backed up (the first backup could take a few minutes).", )}
{_t("Unable to create key backup")}