2015-11-18 18:13:43 +01:00
|
|
|
"use strict";
|
|
|
|
var q = require("q");
|
|
|
|
|
|
|
|
class Stage {
|
|
|
|
constructor(type, matrixClient, signupInstance) {
|
|
|
|
this.type = type;
|
|
|
|
this.client = matrixClient;
|
|
|
|
this.signupInstance = signupInstance;
|
|
|
|
}
|
|
|
|
|
|
|
|
complete() {
|
|
|
|
// Return a promise which is:
|
|
|
|
// RESOLVED => With an Object which has an 'auth' key which is the auth dict
|
|
|
|
// to submit.
|
|
|
|
// REJECTED => With an Error if there was a problem with this stage.
|
|
|
|
// Has a "message" string and an "isFatal" flag.
|
|
|
|
return q.reject("NOT IMPLEMENTED");
|
|
|
|
}
|
2015-11-18 18:43:38 +01:00
|
|
|
|
|
|
|
onReceiveData() {
|
|
|
|
// NOP
|
|
|
|
}
|
2015-11-18 18:13:43 +01:00
|
|
|
}
|
|
|
|
Stage.TYPE = "NOT IMPLEMENTED";
|
|
|
|
|
|
|
|
|
|
|
|
class DummyStage extends Stage {
|
|
|
|
constructor(matrixClient, signupInstance) {
|
|
|
|
super(DummyStage.TYPE, matrixClient, signupInstance);
|
|
|
|
}
|
|
|
|
|
|
|
|
complete() {
|
|
|
|
return q({
|
|
|
|
auth: {
|
|
|
|
type: DummyStage.TYPE
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
}
|
|
|
|
DummyStage.TYPE = "m.login.dummy";
|
|
|
|
|
|
|
|
|
|
|
|
class RecaptchaStage extends Stage {
|
|
|
|
constructor(matrixClient, signupInstance) {
|
|
|
|
super(RecaptchaStage.TYPE, matrixClient, signupInstance);
|
2015-11-18 18:43:38 +01:00
|
|
|
this.defer = q.defer();
|
|
|
|
this.publicKey = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
onReceiveData(data) {
|
|
|
|
if (data !== "loaded") {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
this._attemptRender();
|
2015-11-18 18:13:43 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
complete() {
|
|
|
|
var publicKey;
|
2015-11-18 18:43:38 +01:00
|
|
|
var serverParams = this.signupInstance.getServerData().params;
|
|
|
|
if (serverParams && serverParams["m.login.recaptcha"]) {
|
|
|
|
publicKey = serverParams["m.login.recaptcha"].public_key;
|
2015-11-18 18:13:43 +01:00
|
|
|
}
|
|
|
|
if (!publicKey) {
|
|
|
|
return q.reject({
|
|
|
|
message: "This server has not supplied enough information for Recaptcha " +
|
|
|
|
"authentication",
|
|
|
|
isFatal: true
|
|
|
|
});
|
|
|
|
}
|
2015-11-18 18:43:38 +01:00
|
|
|
this.publicKey = publicKey;
|
|
|
|
this._attemptRender();
|
|
|
|
return this.defer.promise;
|
|
|
|
}
|
|
|
|
|
|
|
|
_attemptRender() {
|
|
|
|
if (!global.grecaptcha) {
|
|
|
|
console.error("grecaptcha not loaded!");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (!this.publicKey) {
|
|
|
|
console.error("No public key for recaptcha!");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
var self = this;
|
2015-11-19 14:58:34 +01:00
|
|
|
// FIXME: Tight coupling here and in CaptchaForm.js
|
2015-11-18 18:13:43 +01:00
|
|
|
global.grecaptcha.render('mx_recaptcha', {
|
2015-11-18 18:43:38 +01:00
|
|
|
sitekey: this.publicKey,
|
2015-11-18 18:13:43 +01:00
|
|
|
callback: function(response) {
|
2015-11-19 16:19:30 +01:00
|
|
|
console.log("Received captcha response");
|
|
|
|
self.defer.resolve({
|
2015-11-18 18:13:43 +01:00
|
|
|
auth: {
|
|
|
|
type: 'm.login.recaptcha',
|
|
|
|
response: response
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
}
|
|
|
|
RecaptchaStage.TYPE = "m.login.recaptcha";
|
|
|
|
|
|
|
|
|
|
|
|
class EmailIdentityStage extends Stage {
|
|
|
|
constructor(matrixClient, signupInstance) {
|
|
|
|
super(EmailIdentityStage.TYPE, matrixClient, signupInstance);
|
|
|
|
}
|
|
|
|
|
2015-11-19 15:16:49 +01:00
|
|
|
_completeVerify() {
|
|
|
|
console.log("_completeVerify");
|
|
|
|
var isLocation = document.createElement('a');
|
|
|
|
isLocation.href = this.signupInstance.getIdentityServerUrl();
|
|
|
|
|
|
|
|
return q({
|
|
|
|
auth: {
|
|
|
|
type: 'm.login.email.identity',
|
|
|
|
threepid_creds: {
|
|
|
|
sid: this.signupInstance.params.idSid,
|
|
|
|
client_secret: this.signupInstance.params.clientSecret,
|
|
|
|
id_server: isLocation.host
|
|
|
|
}
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Complete the email stage.
|
|
|
|
*
|
|
|
|
* This is called twice under different circumstances:
|
|
|
|
* 1) When requesting an email token from the IS
|
|
|
|
* 2) When validating query parameters received from the link in the email
|
|
|
|
*/
|
2015-11-18 18:13:43 +01:00
|
|
|
complete() {
|
2015-11-19 15:16:49 +01:00
|
|
|
console.log("Email complete()");
|
|
|
|
if (this.signupInstance.params.hasEmailInfo) {
|
|
|
|
return this._completeVerify();
|
|
|
|
}
|
|
|
|
|
2015-11-18 18:13:43 +01:00
|
|
|
var config = {
|
|
|
|
clientSecret: this.client.generateClientSecret(),
|
|
|
|
sendAttempt: 1
|
|
|
|
};
|
|
|
|
this.signupInstance.params[EmailIdentityStage.TYPE] = config;
|
|
|
|
|
|
|
|
var nextLink = this.signupInstance.params.registrationUrl +
|
|
|
|
'?client_secret=' +
|
|
|
|
encodeURIComponent(config.clientSecret) +
|
|
|
|
"&hs_url=" +
|
|
|
|
encodeURIComponent(this.signupInstance.getHomeserverUrl()) +
|
|
|
|
"&is_url=" +
|
|
|
|
encodeURIComponent(this.signupInstance.getIdentityServerUrl()) +
|
|
|
|
"&session_id=" +
|
2015-11-19 14:58:34 +01:00
|
|
|
encodeURIComponent(this.signupInstance.getServerData().session);
|
2015-11-18 18:13:43 +01:00
|
|
|
|
|
|
|
return this.client.requestEmailToken(
|
|
|
|
this.signupInstance.email,
|
|
|
|
config.clientSecret,
|
|
|
|
config.sendAttempt,
|
|
|
|
nextLink
|
|
|
|
).then(function(response) {
|
|
|
|
return {}; // don't want to make a request
|
|
|
|
}, function(error) {
|
|
|
|
console.error(error);
|
|
|
|
var e = {
|
|
|
|
isFatal: true
|
|
|
|
};
|
|
|
|
if (error.errcode == 'THREEPID_IN_USE') {
|
|
|
|
e.message = "Email in use";
|
|
|
|
} else {
|
|
|
|
e.message = 'Unable to contact the given identity server';
|
|
|
|
}
|
|
|
|
return e;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
}
|
|
|
|
EmailIdentityStage.TYPE = "m.login.email.identity";
|
|
|
|
|
|
|
|
module.exports = {
|
|
|
|
[DummyStage.TYPE]: DummyStage,
|
|
|
|
[RecaptchaStage.TYPE]: RecaptchaStage,
|
|
|
|
[EmailIdentityStage.TYPE]: EmailIdentityStage
|
|
|
|
};
|