2016-01-19 16:36:54 +00:00
|
|
|
/*
|
|
|
|
Copyright 2016 OpenMarket Ltd
|
2017-03-16 14:56:26 +00:00
|
|
|
Copyright 2017 Vector Creations Ltd
|
2019-09-19 14:50:18 +00:00
|
|
|
Copyright 2019 The Matrix.org Foundation C.I.C.
|
2016-01-19 16:36:54 +00:00
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2023-02-13 11:39:16 +00:00
|
|
|
import { IAuthData, IRequestMsisdnTokenResponse, IRequestTokenResponse } from "matrix-js-sdk/src/matrix";
|
2023-04-14 14:40:19 +00:00
|
|
|
import { MatrixError, HTTPError } from "matrix-js-sdk/src/matrix";
|
2021-10-22 22:23:32 +00:00
|
|
|
|
2021-06-29 12:11:58 +00:00
|
|
|
import { MatrixClientPeg } from "./MatrixClientPeg";
|
2019-10-08 17:56:13 +00:00
|
|
|
import Modal from "./Modal";
|
2023-04-14 14:40:19 +00:00
|
|
|
import { _t, UserFriendlyError } from "./languageHandler";
|
2019-07-29 14:34:50 +00:00
|
|
|
import IdentityAuthClient from "./IdentityAuthClient";
|
2021-06-29 12:11:58 +00:00
|
|
|
import { SSOAuthEntry } from "./components/views/auth/InteractiveAuthEntryComponents";
|
2021-09-27 07:44:30 +00:00
|
|
|
import InteractiveAuthDialog from "./components/views/dialogs/InteractiveAuthDialog";
|
2016-01-19 16:36:54 +00:00
|
|
|
|
2021-09-27 07:44:30 +00:00
|
|
|
function getIdServerDomain(): string {
|
2023-04-14 14:40:19 +00:00
|
|
|
const idBaseUrl = MatrixClientPeg.get().getIdentityServerUrl(true);
|
2023-03-10 14:55:06 +00:00
|
|
|
if (!idBaseUrl) {
|
2023-04-14 14:40:19 +00:00
|
|
|
throw new UserFriendlyError("Identity server not set");
|
2023-03-10 14:55:06 +00:00
|
|
|
}
|
2023-04-14 14:40:19 +00:00
|
|
|
return idBaseUrl;
|
2019-10-07 15:43:17 +00:00
|
|
|
}
|
|
|
|
|
2023-02-13 11:39:16 +00:00
|
|
|
export type Binding = {
|
|
|
|
bind: boolean;
|
|
|
|
label: string;
|
|
|
|
errorTitle: string;
|
|
|
|
};
|
|
|
|
|
2016-01-19 16:36:54 +00:00
|
|
|
/**
|
2019-02-01 00:52:39 +00:00
|
|
|
* Allows a user to add a third party identifier to their homeserver and,
|
2016-01-19 16:36:54 +00:00
|
|
|
* optionally, the identity servers.
|
|
|
|
*
|
|
|
|
* This involves getting an email token from the identity server to "prove" that
|
2017-01-20 14:22:27 +00:00
|
|
|
* the client owns the given email address, which is then passed to the
|
2016-01-19 16:36:54 +00:00
|
|
|
* add threepid API on the homeserver.
|
2019-09-20 10:49:32 +00:00
|
|
|
*
|
|
|
|
* Diagrams of the intended API flows here are available at:
|
|
|
|
*
|
|
|
|
* https://gist.github.com/jryans/839a09bf0c5a70e2f36ed990d50ed928
|
2016-01-19 16:36:54 +00:00
|
|
|
*/
|
2019-01-22 22:18:14 +00:00
|
|
|
export default class AddThreepid {
|
2021-09-27 07:44:30 +00:00
|
|
|
private sessionId: string;
|
2023-02-24 15:28:40 +00:00
|
|
|
private submitUrl?: string;
|
2021-09-27 07:44:30 +00:00
|
|
|
private clientSecret: string;
|
|
|
|
private bind: boolean;
|
|
|
|
|
2022-12-16 12:29:59 +00:00
|
|
|
public constructor() {
|
2016-01-19 16:36:54 +00:00
|
|
|
this.clientSecret = MatrixClientPeg.get().generateClientSecret();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2019-09-19 14:50:18 +00:00
|
|
|
* Attempt to add an email threepid to the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an email to the provided email address.
|
2016-01-19 16:36:54 +00:00
|
|
|
* @param {string} emailAddress The email address to add
|
|
|
|
* @return {Promise} Resolves when the email has been sent. Then call checkEmailLinkClicked().
|
|
|
|
*/
|
2023-04-14 14:40:19 +00:00
|
|
|
public async addEmailAddress(emailAddress: string): Promise<IRequestTokenResponse> {
|
|
|
|
try {
|
|
|
|
const res = await MatrixClientPeg.get().requestAdd3pidEmailToken(emailAddress, this.clientSecret, 1);
|
|
|
|
this.sessionId = res.sid;
|
|
|
|
return res;
|
|
|
|
} catch (err) {
|
|
|
|
if (err instanceof MatrixError && err.errcode === "M_THREEPID_IN_USE") {
|
|
|
|
throw new UserFriendlyError("This email address is already in use", { cause: err });
|
|
|
|
}
|
|
|
|
// Otherwise, just blurt out the same error
|
|
|
|
throw err;
|
|
|
|
}
|
2016-01-19 16:36:54 +00:00
|
|
|
}
|
|
|
|
|
2017-03-16 14:56:26 +00:00
|
|
|
/**
|
2019-09-19 14:50:18 +00:00
|
|
|
* Attempt to bind an email threepid on the identity server via the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an email to the provided email address.
|
|
|
|
* @param {string} emailAddress The email address to add
|
|
|
|
* @return {Promise} Resolves when the email has been sent. Then call checkEmailLinkClicked().
|
|
|
|
*/
|
2021-09-27 07:44:30 +00:00
|
|
|
public async bindEmailAddress(emailAddress: string): Promise<IRequestTokenResponse> {
|
2019-09-19 14:50:18 +00:00
|
|
|
this.bind = true;
|
2019-09-20 10:49:32 +00:00
|
|
|
if (await MatrixClientPeg.get().doesServerSupportSeparateAddAndBind()) {
|
|
|
|
// For separate bind, request a token directly from the IS.
|
|
|
|
const authClient = new IdentityAuthClient();
|
2023-02-24 15:28:40 +00:00
|
|
|
const identityAccessToken = (await authClient.getAccessToken()) ?? undefined;
|
2023-04-14 14:40:19 +00:00
|
|
|
try {
|
|
|
|
const res = await MatrixClientPeg.get().requestEmailToken(
|
|
|
|
emailAddress,
|
|
|
|
this.clientSecret,
|
|
|
|
1,
|
|
|
|
undefined,
|
|
|
|
identityAccessToken,
|
2019-09-20 10:49:32 +00:00
|
|
|
);
|
2023-04-14 14:40:19 +00:00
|
|
|
this.sessionId = res.sid;
|
|
|
|
return res;
|
|
|
|
} catch (err) {
|
|
|
|
if (err instanceof MatrixError && err.errcode === "M_THREEPID_IN_USE") {
|
|
|
|
throw new UserFriendlyError("This email address is already in use", { cause: err });
|
|
|
|
}
|
|
|
|
// Otherwise, just blurt out the same error
|
|
|
|
throw err;
|
|
|
|
}
|
2019-09-20 10:49:32 +00:00
|
|
|
} else {
|
|
|
|
// For tangled bind, request a token via the HS.
|
|
|
|
return this.addEmailAddress(emailAddress);
|
|
|
|
}
|
2019-09-19 14:50:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Attempt to add a MSISDN threepid to the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an SMS to the provided phone number.
|
2017-03-22 12:00:16 +00:00
|
|
|
* @param {string} phoneCountry The ISO 2 letter code of the country to resolve phoneNumber in
|
|
|
|
* @param {string} phoneNumber The national or international formatted phone number to add
|
2017-03-16 14:56:26 +00:00
|
|
|
* @return {Promise} Resolves when the text message has been sent. Then call haveMsisdnToken().
|
|
|
|
*/
|
2023-04-14 14:40:19 +00:00
|
|
|
public async addMsisdn(phoneCountry: string, phoneNumber: string): Promise<IRequestMsisdnTokenResponse> {
|
|
|
|
try {
|
|
|
|
const res = await MatrixClientPeg.get().requestAdd3pidMsisdnToken(
|
|
|
|
phoneCountry,
|
|
|
|
phoneNumber,
|
|
|
|
this.clientSecret,
|
|
|
|
1,
|
2017-03-16 14:56:26 +00:00
|
|
|
);
|
2023-04-14 14:40:19 +00:00
|
|
|
this.sessionId = res.sid;
|
|
|
|
this.submitUrl = res.submit_url;
|
|
|
|
return res;
|
|
|
|
} catch (err) {
|
|
|
|
if (err instanceof MatrixError && err.errcode === "M_THREEPID_IN_USE") {
|
|
|
|
throw new UserFriendlyError("This phone number is already in use", { cause: err });
|
|
|
|
}
|
|
|
|
// Otherwise, just blurt out the same error
|
|
|
|
throw err;
|
|
|
|
}
|
2017-03-16 14:56:26 +00:00
|
|
|
}
|
|
|
|
|
2019-09-19 14:50:18 +00:00
|
|
|
/**
|
|
|
|
* Attempt to bind a MSISDN threepid on the identity server via the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an SMS to the provided phone number.
|
|
|
|
* @param {string} phoneCountry The ISO 2 letter code of the country to resolve phoneNumber in
|
|
|
|
* @param {string} phoneNumber The national or international formatted phone number to add
|
|
|
|
* @return {Promise} Resolves when the text message has been sent. Then call haveMsisdnToken().
|
|
|
|
*/
|
2021-09-27 07:44:30 +00:00
|
|
|
public async bindMsisdn(phoneCountry: string, phoneNumber: string): Promise<IRequestMsisdnTokenResponse> {
|
2019-09-19 14:50:18 +00:00
|
|
|
this.bind = true;
|
2019-09-20 11:45:22 +00:00
|
|
|
if (await MatrixClientPeg.get().doesServerSupportSeparateAddAndBind()) {
|
|
|
|
// For separate bind, request a token directly from the IS.
|
|
|
|
const authClient = new IdentityAuthClient();
|
2023-02-24 15:28:40 +00:00
|
|
|
const identityAccessToken = (await authClient.getAccessToken()) ?? undefined;
|
2023-04-14 14:40:19 +00:00
|
|
|
try {
|
|
|
|
const res = await MatrixClientPeg.get().requestMsisdnToken(
|
|
|
|
phoneCountry,
|
|
|
|
phoneNumber,
|
|
|
|
this.clientSecret,
|
|
|
|
1,
|
|
|
|
undefined,
|
|
|
|
identityAccessToken,
|
2019-09-20 11:45:22 +00:00
|
|
|
);
|
2023-04-14 14:40:19 +00:00
|
|
|
this.sessionId = res.sid;
|
|
|
|
return res;
|
|
|
|
} catch (err) {
|
|
|
|
if (err instanceof MatrixError && err.errcode === "M_THREEPID_IN_USE") {
|
|
|
|
throw new UserFriendlyError("This phone number is already in use", { cause: err });
|
|
|
|
}
|
|
|
|
// Otherwise, just blurt out the same error
|
|
|
|
throw err;
|
|
|
|
}
|
2019-09-20 11:45:22 +00:00
|
|
|
} else {
|
|
|
|
// For tangled bind, request a token via the HS.
|
|
|
|
return this.addMsisdn(phoneCountry, phoneNumber);
|
|
|
|
}
|
2019-09-19 14:50:18 +00:00
|
|
|
}
|
|
|
|
|
2016-01-19 16:36:54 +00:00
|
|
|
/**
|
|
|
|
* Checks if the email link has been clicked by attempting to add the threepid
|
2017-03-16 14:56:26 +00:00
|
|
|
* @return {Promise} Resolves if the email address was added. Rejects with an object
|
2016-01-19 16:36:54 +00:00
|
|
|
* with a "message" property which contains a human-readable message detailing why
|
2017-03-16 14:56:26 +00:00
|
|
|
* the request failed.
|
2016-01-19 16:36:54 +00:00
|
|
|
*/
|
2023-02-28 10:31:48 +00:00
|
|
|
public async checkEmailLinkClicked(): Promise<[success?: boolean, result?: IAuthData | Error | null]> {
|
2019-09-20 10:49:32 +00:00
|
|
|
try {
|
|
|
|
if (await MatrixClientPeg.get().doesServerSupportSeparateAddAndBind()) {
|
|
|
|
if (this.bind) {
|
|
|
|
const authClient = new IdentityAuthClient();
|
|
|
|
const identityAccessToken = await authClient.getAccessToken();
|
2023-03-10 14:55:06 +00:00
|
|
|
if (!identityAccessToken) {
|
2023-04-14 14:40:19 +00:00
|
|
|
throw new UserFriendlyError("No identity access token found");
|
2023-03-10 14:55:06 +00:00
|
|
|
}
|
2019-09-20 10:49:32 +00:00
|
|
|
await MatrixClientPeg.get().bindThreePid({
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
2019-10-07 15:43:17 +00:00
|
|
|
id_server: getIdServerDomain(),
|
2019-09-20 10:49:32 +00:00
|
|
|
id_access_token: identityAccessToken,
|
|
|
|
});
|
|
|
|
} else {
|
2019-10-08 17:56:13 +00:00
|
|
|
try {
|
2021-09-27 07:44:30 +00:00
|
|
|
await this.makeAddThreepidOnlyRequest();
|
2019-10-08 17:56:13 +00:00
|
|
|
|
|
|
|
// The spec has always required this to use UI auth but synapse briefly
|
|
|
|
// implemented it without, so this may just succeed and that's OK.
|
2023-02-28 10:31:48 +00:00
|
|
|
return [true];
|
2023-04-14 14:40:19 +00:00
|
|
|
} catch (err) {
|
|
|
|
if (!(err instanceof MatrixError) || err.httpStatus !== 401 || !err.data || !err.data.flows) {
|
2019-10-08 17:56:13 +00:00
|
|
|
// doesn't look like an interactive-auth failure
|
2023-04-14 14:40:19 +00:00
|
|
|
throw err;
|
2019-10-08 17:56:13 +00:00
|
|
|
}
|
|
|
|
|
2020-03-31 02:18:52 +00:00
|
|
|
const dialogAesthetics = {
|
|
|
|
[SSOAuthEntry.PHASE_PREAUTH]: {
|
|
|
|
title: _t("Use Single Sign On to continue"),
|
2020-03-31 02:24:53 +00:00
|
|
|
body: _t(
|
2023-02-27 09:15:27 +00:00
|
|
|
"Confirm adding this email address by using Single Sign On to prove your identity.",
|
2020-03-31 02:24:53 +00:00
|
|
|
),
|
2020-03-31 02:18:52 +00:00
|
|
|
continueText: _t("Single Sign On"),
|
|
|
|
continueKind: "primary",
|
|
|
|
},
|
|
|
|
[SSOAuthEntry.PHASE_POSTAUTH]: {
|
|
|
|
title: _t("Confirm adding email"),
|
|
|
|
body: _t("Click the button below to confirm adding this email address."),
|
|
|
|
continueText: _t("Confirm"),
|
|
|
|
continueKind: "primary",
|
|
|
|
},
|
|
|
|
};
|
2023-02-28 10:31:48 +00:00
|
|
|
const { finished } = Modal.createDialog(InteractiveAuthDialog, {
|
|
|
|
title: _t("Add Email Address"),
|
|
|
|
matrixClient: MatrixClientPeg.get(),
|
2023-04-14 14:40:19 +00:00
|
|
|
authData: err.data,
|
2023-02-28 10:31:48 +00:00
|
|
|
makeRequest: this.makeAddThreepidOnlyRequest,
|
|
|
|
aestheticsForStagePhases: {
|
|
|
|
[SSOAuthEntry.LOGIN_TYPE]: dialogAesthetics,
|
|
|
|
[SSOAuthEntry.UNSTABLE_LOGIN_TYPE]: dialogAesthetics,
|
2020-03-31 02:18:52 +00:00
|
|
|
},
|
2023-02-28 10:31:48 +00:00
|
|
|
});
|
2019-10-09 10:30:44 +00:00
|
|
|
return finished;
|
2019-10-08 17:56:13 +00:00
|
|
|
}
|
2019-09-20 10:49:32 +00:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
await MatrixClientPeg.get().addThreePid(
|
|
|
|
{
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
2019-10-07 15:43:17 +00:00
|
|
|
id_server: getIdServerDomain(),
|
2019-09-20 10:49:32 +00:00
|
|
|
},
|
|
|
|
this.bind,
|
|
|
|
);
|
|
|
|
}
|
|
|
|
} catch (err) {
|
2023-04-14 14:40:19 +00:00
|
|
|
if (err instanceof HTTPError && err.httpStatus === 401) {
|
|
|
|
throw new UserFriendlyError(
|
|
|
|
"Failed to verify email address: make sure you clicked the link in the email",
|
|
|
|
{ cause: err },
|
|
|
|
);
|
2016-01-19 16:36:54 +00:00
|
|
|
}
|
2023-04-14 14:40:19 +00:00
|
|
|
// Otherwise, just blurt out the same error
|
2016-01-19 16:36:54 +00:00
|
|
|
throw err;
|
2019-09-20 10:49:32 +00:00
|
|
|
}
|
2023-02-28 10:31:48 +00:00
|
|
|
return [];
|
2016-01-19 16:36:54 +00:00
|
|
|
}
|
2017-03-16 14:56:26 +00:00
|
|
|
|
2019-10-08 17:56:13 +00:00
|
|
|
/**
|
2021-09-27 07:44:30 +00:00
|
|
|
* @param {{type: string, session?: string}} auth UI auth object
|
2019-10-08 17:56:13 +00:00
|
|
|
* @return {Promise<Object>} Response from /3pid/add call (in current spec, an empty object)
|
|
|
|
*/
|
2021-09-27 07:44:30 +00:00
|
|
|
private makeAddThreepidOnlyRequest = (auth?: { type: string; session?: string }): Promise<{}> => {
|
2019-10-08 17:56:13 +00:00
|
|
|
return MatrixClientPeg.get().addThreePidOnly({
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
|
|
|
auth,
|
|
|
|
});
|
2021-09-27 07:44:30 +00:00
|
|
|
};
|
2019-10-08 17:56:13 +00:00
|
|
|
|
2017-03-16 14:56:26 +00:00
|
|
|
/**
|
|
|
|
* Takes a phone number verification code as entered by the user and validates
|
2021-07-13 14:26:38 +00:00
|
|
|
* it with the identity server, then if successful, adds the phone number.
|
2019-07-29 14:34:50 +00:00
|
|
|
* @param {string} msisdnToken phone number verification code as entered by the user
|
2017-03-22 12:00:16 +00:00
|
|
|
* @return {Promise} Resolves if the phone number was added. Rejects with an object
|
2017-03-16 14:56:26 +00:00
|
|
|
* with a "message" property which contains a human-readable message detailing why
|
|
|
|
* the request failed.
|
|
|
|
*/
|
2023-03-10 14:55:06 +00:00
|
|
|
public async haveMsisdnToken(
|
|
|
|
msisdnToken: string,
|
|
|
|
): Promise<[success?: boolean, result?: IAuthData | Error | null] | undefined> {
|
2019-07-29 14:34:50 +00:00
|
|
|
const authClient = new IdentityAuthClient();
|
2019-10-31 14:50:21 +00:00
|
|
|
const supportsSeparateAddAndBind = await MatrixClientPeg.get().doesServerSupportSeparateAddAndBind();
|
2019-09-23 11:21:25 +00:00
|
|
|
|
2023-04-20 08:49:10 +00:00
|
|
|
let result: { success: boolean } | MatrixError;
|
2019-09-23 11:21:25 +00:00
|
|
|
if (this.submitUrl) {
|
|
|
|
result = await MatrixClientPeg.get().submitMsisdnTokenOtherUrl(
|
|
|
|
this.submitUrl,
|
|
|
|
this.sessionId,
|
|
|
|
this.clientSecret,
|
|
|
|
msisdnToken,
|
|
|
|
);
|
2019-10-31 14:50:21 +00:00
|
|
|
} else if (this.bind || !supportsSeparateAddAndBind) {
|
2019-09-23 11:21:25 +00:00
|
|
|
result = await MatrixClientPeg.get().submitMsisdnToken(
|
|
|
|
this.sessionId,
|
|
|
|
this.clientSecret,
|
|
|
|
msisdnToken,
|
2019-09-23 11:28:41 +00:00
|
|
|
await authClient.getAccessToken(),
|
2019-09-23 11:21:25 +00:00
|
|
|
);
|
2019-10-31 14:50:21 +00:00
|
|
|
} else {
|
2023-04-14 14:40:19 +00:00
|
|
|
throw new UserFriendlyError("The add / bind with MSISDN flow is misconfigured");
|
2019-09-23 11:21:25 +00:00
|
|
|
}
|
2023-04-20 08:49:10 +00:00
|
|
|
if (result instanceof Error) {
|
2019-07-29 14:31:21 +00:00
|
|
|
throw result;
|
|
|
|
}
|
|
|
|
|
2019-10-31 14:50:21 +00:00
|
|
|
if (supportsSeparateAddAndBind) {
|
2019-09-20 11:45:22 +00:00
|
|
|
if (this.bind) {
|
|
|
|
await MatrixClientPeg.get().bindThreePid({
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
2019-10-08 06:43:40 +00:00
|
|
|
id_server: getIdServerDomain(),
|
2019-09-23 11:28:41 +00:00
|
|
|
id_access_token: await authClient.getAccessToken(),
|
2019-09-20 11:45:22 +00:00
|
|
|
});
|
|
|
|
} else {
|
2019-10-08 18:07:39 +00:00
|
|
|
try {
|
2021-09-27 07:44:30 +00:00
|
|
|
await this.makeAddThreepidOnlyRequest();
|
2019-10-08 18:07:39 +00:00
|
|
|
|
|
|
|
// The spec has always required this to use UI auth but synapse briefly
|
|
|
|
// implemented it without, so this may just succeed and that's OK.
|
|
|
|
return;
|
2023-04-14 14:40:19 +00:00
|
|
|
} catch (err) {
|
|
|
|
if (!(err instanceof MatrixError) || err.httpStatus !== 401 || !err.data || !err.data.flows) {
|
2019-10-08 18:07:39 +00:00
|
|
|
// doesn't look like an interactive-auth failure
|
2023-04-14 14:40:19 +00:00
|
|
|
throw err;
|
2019-10-08 18:07:39 +00:00
|
|
|
}
|
|
|
|
|
2020-03-31 02:18:52 +00:00
|
|
|
const dialogAesthetics = {
|
|
|
|
[SSOAuthEntry.PHASE_PREAUTH]: {
|
|
|
|
title: _t("Use Single Sign On to continue"),
|
2020-03-31 02:24:53 +00:00
|
|
|
body: _t(
|
2023-02-27 09:15:27 +00:00
|
|
|
"Confirm adding this phone number by using Single Sign On to prove your identity.",
|
2020-03-31 02:24:53 +00:00
|
|
|
),
|
2020-03-31 02:18:52 +00:00
|
|
|
continueText: _t("Single Sign On"),
|
|
|
|
continueKind: "primary",
|
|
|
|
},
|
|
|
|
[SSOAuthEntry.PHASE_POSTAUTH]: {
|
|
|
|
title: _t("Confirm adding phone number"),
|
|
|
|
body: _t("Click the button below to confirm adding this phone number."),
|
|
|
|
continueText: _t("Confirm"),
|
|
|
|
continueKind: "primary",
|
|
|
|
},
|
|
|
|
};
|
2022-06-14 16:51:51 +00:00
|
|
|
const { finished } = Modal.createDialog(InteractiveAuthDialog, {
|
2019-10-09 10:28:16 +00:00
|
|
|
title: _t("Add Phone Number"),
|
|
|
|
matrixClient: MatrixClientPeg.get(),
|
2023-04-14 14:40:19 +00:00
|
|
|
authData: err.data,
|
2021-09-27 07:44:30 +00:00
|
|
|
makeRequest: this.makeAddThreepidOnlyRequest,
|
2020-03-31 02:18:52 +00:00
|
|
|
aestheticsForStagePhases: {
|
|
|
|
[SSOAuthEntry.LOGIN_TYPE]: dialogAesthetics,
|
|
|
|
[SSOAuthEntry.UNSTABLE_LOGIN_TYPE]: dialogAesthetics,
|
|
|
|
},
|
2019-10-08 18:07:39 +00:00
|
|
|
});
|
2019-10-09 10:30:44 +00:00
|
|
|
return finished;
|
2019-10-08 18:07:39 +00:00
|
|
|
}
|
2019-09-20 11:45:22 +00:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
await MatrixClientPeg.get().addThreePid(
|
|
|
|
{
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
2019-10-08 06:43:40 +00:00
|
|
|
id_server: getIdServerDomain(),
|
2019-09-20 11:45:22 +00:00
|
|
|
},
|
|
|
|
this.bind,
|
|
|
|
);
|
|
|
|
}
|
2017-03-16 14:56:26 +00:00
|
|
|
}
|
2016-01-19 16:36:54 +00:00
|
|
|
}
|