2019-12-05 15:20:30 +00:00
|
|
|
/*
|
2020-09-03 13:50:49 +00:00
|
|
|
Copyright 2019, 2020 The Matrix.org Foundation C.I.C.
|
2019-12-05 15:20:30 +00:00
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2021-07-07 19:19:52 +00:00
|
|
|
import { ICryptoCallbacks } from "matrix-js-sdk/src/matrix";
|
|
|
|
import { ISecretStorageKeyInfo } from "matrix-js-sdk/src/crypto/api";
|
2020-10-09 15:59:56 +00:00
|
|
|
import { MatrixClient } from "matrix-js-sdk/src/client";
|
2021-12-09 09:10:23 +00:00
|
|
|
import { deriveKey } from "matrix-js-sdk/src/crypto/key_passphrase";
|
|
|
|
import { decodeRecoveryKey } from "matrix-js-sdk/src/crypto/recoverykey";
|
|
|
|
import { encodeBase64 } from "matrix-js-sdk/src/crypto/olmlib";
|
|
|
|
import { DeviceTrustLevel } from "matrix-js-sdk/src/crypto/CrossSigning";
|
|
|
|
import { logger } from "matrix-js-sdk/src/logger";
|
|
|
|
import { ComponentType } from "react";
|
|
|
|
|
2019-12-05 15:20:30 +00:00
|
|
|
import Modal from "./Modal";
|
2021-06-29 12:11:58 +00:00
|
|
|
import { MatrixClientPeg } from "./MatrixClientPeg";
|
2019-12-11 15:05:03 +00:00
|
|
|
import { _t } from "./languageHandler";
|
2020-08-14 17:06:35 +00:00
|
|
|
import { isSecureBackupRequired } from "./utils/WellKnownUtils";
|
2020-09-10 12:56:07 +00:00
|
|
|
import AccessSecretStorageDialog from "./components/views/dialogs/security/AccessSecretStorageDialog";
|
|
|
|
import RestoreKeyBackupDialog from "./components/views/dialogs/security/RestoreKeyBackupDialog";
|
2020-10-02 01:41:03 +00:00
|
|
|
import SettingsStore from "./settings/SettingsStore";
|
2020-10-08 15:35:17 +00:00
|
|
|
import SecurityCustomisations from "./customisations/Security";
|
2021-11-08 10:27:52 +00:00
|
|
|
import QuestionDialog from "./components/views/dialogs/QuestionDialog";
|
2022-03-02 23:33:40 +00:00
|
|
|
import InteractiveAuthDialog from "./components/views/dialogs/InteractiveAuthDialog";
|
2021-09-21 15:48:09 +00:00
|
|
|
|
2019-12-11 14:28:02 +00:00
|
|
|
// This stores the secret storage private keys in memory for the JS SDK. This is
|
|
|
|
// only meant to act as a cache to avoid prompting the user multiple times
|
2019-12-11 15:05:03 +00:00
|
|
|
// during the same single operation. Use `accessSecretStorage` below to scope a
|
|
|
|
// single secret storage operation, as it will clear the cached keys once the
|
|
|
|
// operation ends.
|
2020-10-09 15:59:56 +00:00
|
|
|
let secretStorageKeys: Record<string, Uint8Array> = {};
|
|
|
|
let secretStorageKeyInfo: Record<string, ISecretStorageKeyInfo> = {};
|
2020-01-30 14:18:12 +00:00
|
|
|
let secretStorageBeingAccessed = false;
|
|
|
|
|
2020-10-02 00:23:12 +00:00
|
|
|
let nonInteractive = false;
|
2020-09-03 20:28:42 +00:00
|
|
|
|
2020-10-09 15:59:56 +00:00
|
|
|
let dehydrationCache: {
|
2021-07-01 22:23:03 +00:00
|
|
|
key?: Uint8Array;
|
|
|
|
keyInfo?: ISecretStorageKeyInfo;
|
2020-10-09 15:59:56 +00:00
|
|
|
} = {};
|
2020-09-03 20:28:42 +00:00
|
|
|
|
2020-10-09 15:59:56 +00:00
|
|
|
function isCachingAllowed(): boolean {
|
2020-06-18 09:42:33 +00:00
|
|
|
return secretStorageBeingAccessed;
|
2020-01-30 14:18:12 +00:00
|
|
|
}
|
2019-12-11 14:28:02 +00:00
|
|
|
|
2020-08-19 12:28:03 +00:00
|
|
|
/**
|
|
|
|
* This can be used by other components to check if secret storage access is in
|
|
|
|
* progress, so that we can e.g. avoid intermittently showing toasts during
|
|
|
|
* secret storage setup.
|
|
|
|
*
|
|
|
|
* @returns {bool}
|
|
|
|
*/
|
2020-10-09 15:59:56 +00:00
|
|
|
export function isSecretStorageBeingAccessed(): boolean {
|
2020-08-19 12:28:03 +00:00
|
|
|
return secretStorageBeingAccessed;
|
|
|
|
}
|
|
|
|
|
2020-01-31 10:35:05 +00:00
|
|
|
export class AccessCancelledError extends Error {
|
2022-12-16 12:29:59 +00:00
|
|
|
public constructor() {
|
2020-01-31 10:35:05 +00:00
|
|
|
super("Secret storage access canceled");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-09 15:59:56 +00:00
|
|
|
async function confirmToDismiss(): Promise<boolean> {
|
2020-02-06 15:51:02 +00:00
|
|
|
const [sure] = await Modal.createDialog(QuestionDialog, {
|
|
|
|
title: _t("Cancel entering passphrase?"),
|
2020-07-06 14:26:40 +00:00
|
|
|
description: _t("Are you sure you want to cancel entering passphrase?"),
|
2020-06-25 13:52:59 +00:00
|
|
|
danger: false,
|
2020-07-06 14:26:40 +00:00
|
|
|
button: _t("Go Back"),
|
2020-06-25 13:52:59 +00:00
|
|
|
cancelButton: _t("Cancel"),
|
2020-02-06 15:51:02 +00:00
|
|
|
}).finished;
|
2020-06-25 13:52:59 +00:00
|
|
|
return !sure;
|
2020-02-06 15:51:02 +00:00
|
|
|
}
|
|
|
|
|
2022-05-03 21:04:37 +00:00
|
|
|
type KeyParams = { passphrase: string; recoveryKey: string };
|
|
|
|
|
|
|
|
function makeInputToKey(keyInfo: ISecretStorageKeyInfo): (keyParams: KeyParams) => Promise<Uint8Array> {
|
2023-01-12 13:25:14 +00:00
|
|
|
return async ({ passphrase, recoveryKey }): Promise<Uint8Array> => {
|
2020-09-30 04:52:47 +00:00
|
|
|
if (passphrase) {
|
|
|
|
return deriveKey(passphrase, keyInfo.passphrase.salt, keyInfo.passphrase.iterations);
|
|
|
|
} else {
|
|
|
|
return decodeRecoveryKey(recoveryKey);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2020-10-09 15:59:56 +00:00
|
|
|
async function getSecretStorageKey({
|
|
|
|
keys: keyInfos,
|
|
|
|
}: {
|
|
|
|
keys: Record<string, ISecretStorageKeyInfo>;
|
|
|
|
}): Promise<[string, Uint8Array]> {
|
2021-02-11 21:34:15 +00:00
|
|
|
const cli = MatrixClientPeg.get();
|
|
|
|
let keyId = await cli.getDefaultSecretStorageKeyId();
|
2022-05-03 21:04:37 +00:00
|
|
|
let keyInfo: ISecretStorageKeyInfo;
|
2021-02-11 21:34:15 +00:00
|
|
|
if (keyId) {
|
|
|
|
// use the default SSSS key if set
|
|
|
|
keyInfo = keyInfos[keyId];
|
|
|
|
if (!keyInfo) {
|
2021-02-24 22:55:27 +00:00
|
|
|
// if the default key is not available, pretend the default key
|
|
|
|
// isn't set
|
|
|
|
keyId = undefined;
|
2021-02-11 21:34:15 +00:00
|
|
|
}
|
2021-02-24 22:55:27 +00:00
|
|
|
}
|
|
|
|
if (!keyId) {
|
2021-02-11 21:34:15 +00:00
|
|
|
// if no default SSSS key is set, fall back to a heuristic of using the
|
|
|
|
// only available key, if only one key is set
|
|
|
|
const keyInfoEntries = Object.entries(keyInfos);
|
|
|
|
if (keyInfoEntries.length > 1) {
|
|
|
|
throw new Error("Multiple storage key requests not implemented");
|
|
|
|
}
|
|
|
|
[keyId, keyInfo] = keyInfoEntries[0];
|
2019-12-05 15:20:30 +00:00
|
|
|
}
|
2019-12-11 14:28:02 +00:00
|
|
|
|
|
|
|
// Check the in-memory cache
|
2020-08-28 11:10:17 +00:00
|
|
|
if (isCachingAllowed() && secretStorageKeys[keyId]) {
|
|
|
|
return [keyId, secretStorageKeys[keyId]];
|
2019-12-11 14:28:02 +00:00
|
|
|
}
|
|
|
|
|
2020-10-02 00:23:12 +00:00
|
|
|
if (dehydrationCache.key) {
|
|
|
|
if (await MatrixClientPeg.get().checkSecretStorageKey(dehydrationCache.key, keyInfo)) {
|
2020-10-09 15:59:56 +00:00
|
|
|
cacheSecretStorageKey(keyId, keyInfo, dehydrationCache.key);
|
2020-10-02 00:23:12 +00:00
|
|
|
return [keyId, dehydrationCache.key];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-08 15:35:17 +00:00
|
|
|
const keyFromCustomisations = SecurityCustomisations.getSecretStorageKey?.();
|
|
|
|
if (keyFromCustomisations) {
|
2021-09-21 15:48:09 +00:00
|
|
|
logger.log("Using key from security customisations (secret storage)");
|
2020-10-08 15:35:17 +00:00
|
|
|
cacheSecretStorageKey(keyId, keyInfo, keyFromCustomisations);
|
|
|
|
return [keyId, keyFromCustomisations];
|
|
|
|
}
|
|
|
|
|
2020-10-02 00:23:12 +00:00
|
|
|
if (nonInteractive) {
|
|
|
|
throw new Error("Could not unlock non-interactively");
|
2020-09-03 20:28:42 +00:00
|
|
|
}
|
|
|
|
|
2020-09-30 04:52:47 +00:00
|
|
|
const inputToKey = makeInputToKey(keyInfo);
|
2022-06-14 16:51:51 +00:00
|
|
|
const { finished } = Modal.createDialog(
|
2019-12-06 17:54:00 +00:00
|
|
|
AccessSecretStorageDialog,
|
2020-02-06 12:11:24 +00:00
|
|
|
/* props= */
|
2019-12-06 17:54:00 +00:00
|
|
|
{
|
2020-08-28 11:10:17 +00:00
|
|
|
keyInfo,
|
2023-01-12 13:25:14 +00:00
|
|
|
checkPrivateKey: async (input: KeyParams): Promise<boolean> => {
|
2019-12-06 17:54:00 +00:00
|
|
|
const key = await inputToKey(input);
|
2022-05-03 21:04:37 +00:00
|
|
|
return MatrixClientPeg.get().checkSecretStorageKey(key, keyInfo);
|
2019-12-06 17:54:00 +00:00
|
|
|
},
|
|
|
|
},
|
2020-02-06 12:11:24 +00:00
|
|
|
/* className= */ null,
|
|
|
|
/* isPriorityModal= */ false,
|
|
|
|
/* isStaticModal= */ false,
|
|
|
|
/* options= */ {
|
2023-01-12 13:25:14 +00:00
|
|
|
onBeforeClose: async (reason): Promise<boolean> => {
|
2020-02-06 15:51:02 +00:00
|
|
|
if (reason === "backgroundClick") {
|
2020-07-06 14:26:40 +00:00
|
|
|
return confirmToDismiss();
|
2020-02-06 12:11:24 +00:00
|
|
|
}
|
2020-02-06 15:51:02 +00:00
|
|
|
return true;
|
2020-02-06 12:11:24 +00:00
|
|
|
},
|
|
|
|
},
|
2019-12-05 15:20:30 +00:00
|
|
|
);
|
2022-05-03 21:04:37 +00:00
|
|
|
const [keyParams] = await finished;
|
|
|
|
if (!keyParams) {
|
2020-01-31 10:35:05 +00:00
|
|
|
throw new AccessCancelledError();
|
2019-12-05 15:20:30 +00:00
|
|
|
}
|
2022-05-03 21:04:37 +00:00
|
|
|
const key = await inputToKey(keyParams);
|
2019-12-11 14:28:02 +00:00
|
|
|
|
|
|
|
// Save to cache to avoid future prompts in the current session
|
2020-10-09 15:59:56 +00:00
|
|
|
cacheSecretStorageKey(keyId, keyInfo, key);
|
2020-08-28 11:10:17 +00:00
|
|
|
|
|
|
|
return [keyId, key];
|
|
|
|
}
|
|
|
|
|
2020-10-09 15:59:56 +00:00
|
|
|
export async function getDehydrationKey(
|
|
|
|
keyInfo: ISecretStorageKeyInfo,
|
2023-02-13 11:39:16 +00:00
|
|
|
checkFunc: (data: Uint8Array) => void,
|
2020-10-09 15:59:56 +00:00
|
|
|
): Promise<Uint8Array> {
|
2020-10-08 15:35:17 +00:00
|
|
|
const keyFromCustomisations = SecurityCustomisations.getSecretStorageKey?.();
|
|
|
|
if (keyFromCustomisations) {
|
2021-09-21 15:48:09 +00:00
|
|
|
logger.log("Using key from security customisations (dehydration)");
|
2020-10-08 15:35:17 +00:00
|
|
|
return keyFromCustomisations;
|
|
|
|
}
|
|
|
|
|
2020-09-30 04:52:47 +00:00
|
|
|
const inputToKey = makeInputToKey(keyInfo);
|
2022-06-14 16:51:51 +00:00
|
|
|
const { finished } = Modal.createDialog(
|
2020-09-30 04:52:47 +00:00
|
|
|
AccessSecretStorageDialog,
|
|
|
|
/* props= */
|
|
|
|
{
|
|
|
|
keyInfo,
|
2023-02-13 11:39:16 +00:00
|
|
|
checkPrivateKey: async (input: KeyParams): Promise<boolean> => {
|
2020-09-30 04:52:47 +00:00
|
|
|
const key = await inputToKey(input);
|
|
|
|
try {
|
|
|
|
checkFunc(key);
|
|
|
|
return true;
|
|
|
|
} catch (e) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
},
|
|
|
|
},
|
|
|
|
/* className= */ null,
|
|
|
|
/* isPriorityModal= */ false,
|
|
|
|
/* isStaticModal= */ false,
|
|
|
|
/* options= */ {
|
2023-01-12 13:25:14 +00:00
|
|
|
onBeforeClose: async (reason): Promise<boolean> => {
|
2020-09-30 04:52:47 +00:00
|
|
|
if (reason === "backgroundClick") {
|
|
|
|
return confirmToDismiss();
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
},
|
|
|
|
},
|
|
|
|
);
|
|
|
|
const [input] = await finished;
|
|
|
|
if (!input) {
|
|
|
|
throw new AccessCancelledError();
|
|
|
|
}
|
|
|
|
const key = await inputToKey(input);
|
2020-10-02 00:23:12 +00:00
|
|
|
|
2020-09-30 04:52:47 +00:00
|
|
|
// need to copy the key because rehydration (unpickling) will clobber it
|
2021-06-29 12:11:58 +00:00
|
|
|
dehydrationCache = { key: new Uint8Array(key), keyInfo };
|
2020-10-02 00:23:12 +00:00
|
|
|
|
2020-09-30 04:52:47 +00:00
|
|
|
return key;
|
|
|
|
}
|
|
|
|
|
2020-10-09 15:59:56 +00:00
|
|
|
function cacheSecretStorageKey(keyId: string, keyInfo: ISecretStorageKeyInfo, key: Uint8Array): void {
|
2020-01-30 14:18:12 +00:00
|
|
|
if (isCachingAllowed()) {
|
2020-08-28 11:10:17 +00:00
|
|
|
secretStorageKeys[keyId] = key;
|
2020-09-30 04:52:47 +00:00
|
|
|
secretStorageKeyInfo[keyId] = keyInfo;
|
2019-12-12 15:34:01 +00:00
|
|
|
}
|
|
|
|
}
|
2019-12-11 15:05:03 +00:00
|
|
|
|
2020-10-09 15:59:56 +00:00
|
|
|
async function onSecretRequested(
|
|
|
|
userId: string,
|
|
|
|
deviceId: string,
|
|
|
|
requestId: string,
|
|
|
|
name: string,
|
2021-06-23 13:47:24 +00:00
|
|
|
deviceTrust: DeviceTrustLevel,
|
2020-10-09 15:59:56 +00:00
|
|
|
): Promise<string> {
|
2021-09-21 15:48:09 +00:00
|
|
|
logger.log("onSecretRequested", userId, deviceId, requestId, name, deviceTrust);
|
2020-03-02 16:28:10 +00:00
|
|
|
const client = MatrixClientPeg.get();
|
|
|
|
if (userId !== client.getUserId()) {
|
|
|
|
return;
|
|
|
|
}
|
2022-05-26 10:12:49 +00:00
|
|
|
if (!deviceTrust?.isVerified()) {
|
2021-09-21 15:48:09 +00:00
|
|
|
logger.log(`Ignoring secret request from untrusted device ${deviceId}`);
|
2020-03-02 16:28:10 +00:00
|
|
|
return;
|
|
|
|
}
|
2020-08-07 14:54:05 +00:00
|
|
|
if (
|
|
|
|
name === "m.cross_signing.master" ||
|
|
|
|
name === "m.cross_signing.self_signing" ||
|
|
|
|
name === "m.cross_signing.user_signing"
|
|
|
|
) {
|
2020-03-25 14:06:47 +00:00
|
|
|
const callbacks = client.getCrossSigningCacheCallbacks();
|
|
|
|
if (!callbacks.getCrossSigningKeyCache) return;
|
2020-08-06 14:10:47 +00:00
|
|
|
const keyId = name.replace("m.cross_signing.", "");
|
|
|
|
const key = await callbacks.getCrossSigningKeyCache(keyId);
|
|
|
|
if (!key) {
|
|
|
|
logger.log(`${keyId} requested by ${deviceId}, but not found in cache`);
|
2020-03-24 15:49:51 +00:00
|
|
|
}
|
2020-08-06 14:10:47 +00:00
|
|
|
return key && encodeBase64(key);
|
2020-03-25 14:06:47 +00:00
|
|
|
} else if (name === "m.megolm_backup.v1") {
|
2021-06-02 03:36:28 +00:00
|
|
|
const key = await client.crypto.getSessionBackupPrivateKey();
|
2020-03-24 15:49:51 +00:00
|
|
|
if (!key) {
|
2020-03-25 16:08:26 +00:00
|
|
|
logger.log(`session backup key requested by ${deviceId}, but not found in cache`);
|
2020-03-24 15:49:51 +00:00
|
|
|
}
|
2020-03-02 16:28:10 +00:00
|
|
|
return key && encodeBase64(key);
|
|
|
|
}
|
2021-10-15 14:31:29 +00:00
|
|
|
logger.warn("onSecretRequested didn't recognise the secret named ", name);
|
2020-10-09 15:59:56 +00:00
|
|
|
}
|
2020-03-02 16:28:10 +00:00
|
|
|
|
2020-10-09 15:59:56 +00:00
|
|
|
export const crossSigningCallbacks: ICryptoCallbacks = {
|
2019-12-11 15:05:03 +00:00
|
|
|
getSecretStorageKey,
|
2020-08-28 11:10:17 +00:00
|
|
|
cacheSecretStorageKey,
|
2020-03-02 16:28:10 +00:00
|
|
|
onSecretRequested,
|
2020-09-30 04:52:47 +00:00
|
|
|
getDehydrationKey,
|
2019-12-11 15:05:03 +00:00
|
|
|
};
|
|
|
|
|
2020-10-09 15:59:56 +00:00
|
|
|
export async function promptForBackupPassphrase(): Promise<Uint8Array> {
|
2022-05-26 10:12:49 +00:00
|
|
|
let key: Uint8Array;
|
2020-03-19 20:42:16 +00:00
|
|
|
|
2022-06-14 16:51:51 +00:00
|
|
|
const { finished } = Modal.createDialog(
|
|
|
|
RestoreKeyBackupDialog,
|
|
|
|
{
|
2020-04-09 16:30:10 +00:00
|
|
|
showSummary: false,
|
2023-02-13 11:39:16 +00:00
|
|
|
keyCallback: (k: Uint8Array) => (key = k),
|
2020-03-23 19:04:59 +00:00
|
|
|
},
|
|
|
|
null,
|
|
|
|
/* priority = */ false,
|
|
|
|
/* static = */ true,
|
|
|
|
);
|
2020-03-19 20:42:16 +00:00
|
|
|
|
|
|
|
const success = await finished;
|
|
|
|
if (!success) throw new Error("Key backup prompt cancelled");
|
|
|
|
|
|
|
|
return key;
|
|
|
|
}
|
|
|
|
|
2019-12-11 15:05:03 +00:00
|
|
|
/**
|
|
|
|
* This helper should be used whenever you need to access secret storage. It
|
|
|
|
* ensures that secret storage (and also cross-signing since they each depend on
|
|
|
|
* each other in a cycle of sorts) have been bootstrapped before running the
|
|
|
|
* provided function.
|
|
|
|
*
|
|
|
|
* Bootstrapping secret storage may take one of these paths:
|
|
|
|
* 1. Create secret storage from a passphrase and store cross-signing keys
|
|
|
|
* in secret storage.
|
|
|
|
* 2. Access existing secret storage by requesting passphrase and accessing
|
|
|
|
* cross-signing keys as needed.
|
|
|
|
* 3. All keys are loaded and there's nothing to do.
|
|
|
|
*
|
|
|
|
* Additionally, the secret storage keys are cached during the scope of this function
|
|
|
|
* to ensure the user is prompted only once for their secret storage
|
2020-01-03 13:45:52 +00:00
|
|
|
* passphrase. The cache is then cleared once the provided function completes.
|
2019-12-11 15:05:03 +00:00
|
|
|
*
|
|
|
|
* @param {Function} [func] An operation to perform once secret storage has been
|
|
|
|
* bootstrapped. Optional.
|
2020-06-18 08:35:11 +00:00
|
|
|
* @param {bool} [forceReset] Reset secret storage even if it's already set up
|
2019-12-11 15:05:03 +00:00
|
|
|
*/
|
2023-01-12 13:25:14 +00:00
|
|
|
export async function accessSecretStorage(func = async (): Promise<void> => {}, forceReset = false): Promise<void> {
|
2019-12-11 15:05:03 +00:00
|
|
|
const cli = MatrixClientPeg.get();
|
2020-01-30 14:18:12 +00:00
|
|
|
secretStorageBeingAccessed = true;
|
2019-12-11 15:05:03 +00:00
|
|
|
try {
|
2021-09-21 15:48:09 +00:00
|
|
|
if (!(await cli.hasSecretStorageKey()) || forceReset) {
|
2019-12-11 15:05:03 +00:00
|
|
|
// This dialog calls bootstrap itself after guiding the user through
|
|
|
|
// passphrase creation.
|
2022-06-14 16:51:51 +00:00
|
|
|
const { finished } = Modal.createDialogAsync(
|
2021-10-23 03:32:16 +00:00
|
|
|
import("./async-components/views/dialogs/security/CreateSecretStorageDialog") as unknown as Promise<
|
|
|
|
ComponentType<{}>
|
|
|
|
>,
|
2020-02-07 14:55:01 +00:00
|
|
|
{
|
2020-08-27 12:50:50 +00:00
|
|
|
forceReset,
|
2020-02-07 14:55:01 +00:00
|
|
|
},
|
2020-08-14 17:06:35 +00:00
|
|
|
null,
|
|
|
|
/* priority = */ false,
|
|
|
|
/* static = */ true,
|
|
|
|
/* options = */ {
|
2023-01-12 13:25:14 +00:00
|
|
|
onBeforeClose: async (reason): Promise<boolean> => {
|
2020-08-14 17:06:35 +00:00
|
|
|
// If Secure Backup is required, you cannot leave the modal.
|
|
|
|
if (reason === "backgroundClick") {
|
|
|
|
return !isSecureBackupRequired();
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
},
|
2020-02-07 14:55:01 +00:00
|
|
|
},
|
2019-12-11 15:05:03 +00:00
|
|
|
);
|
|
|
|
const [confirmed] = await finished;
|
|
|
|
if (!confirmed) {
|
|
|
|
throw new Error("Secret storage creation canceled");
|
|
|
|
}
|
|
|
|
} else {
|
2020-08-27 12:41:03 +00:00
|
|
|
await cli.bootstrapCrossSigning({
|
2023-01-12 13:25:14 +00:00
|
|
|
authUploadDeviceSigningKeys: async (makeRequest): Promise<void> => {
|
2022-06-14 16:51:51 +00:00
|
|
|
const { finished } = Modal.createDialog(InteractiveAuthDialog, {
|
|
|
|
title: _t("Setting up keys"),
|
|
|
|
matrixClient: cli,
|
|
|
|
makeRequest,
|
|
|
|
});
|
2019-12-11 15:05:03 +00:00
|
|
|
const [confirmed] = await finished;
|
|
|
|
if (!confirmed) {
|
|
|
|
throw new Error("Cross-signing key upload auth canceled");
|
|
|
|
}
|
|
|
|
},
|
2020-08-27 12:41:03 +00:00
|
|
|
});
|
|
|
|
await cli.bootstrapSecretStorage({
|
|
|
|
getKeyBackupPassphrase: promptForBackupPassphrase,
|
2019-12-11 15:05:03 +00:00
|
|
|
});
|
2020-09-30 04:52:47 +00:00
|
|
|
|
|
|
|
const keyId = Object.keys(secretStorageKeys)[0];
|
2020-10-02 01:41:03 +00:00
|
|
|
if (keyId && SettingsStore.getValue("feature_dehydration")) {
|
2020-10-09 15:59:56 +00:00
|
|
|
let dehydrationKeyInfo = {};
|
|
|
|
if (secretStorageKeyInfo[keyId] && secretStorageKeyInfo[keyId].passphrase) {
|
|
|
|
dehydrationKeyInfo = { passphrase: secretStorageKeyInfo[keyId].passphrase };
|
|
|
|
}
|
2021-09-21 15:48:09 +00:00
|
|
|
logger.log("Setting dehydration key");
|
2020-10-02 01:41:03 +00:00
|
|
|
await cli.setDehydrationKey(secretStorageKeys[keyId], dehydrationKeyInfo, "Backup device");
|
2020-10-08 15:35:17 +00:00
|
|
|
} else if (!keyId) {
|
2021-10-15 14:31:29 +00:00
|
|
|
logger.warn("Not setting dehydration key: no SSSS key found");
|
2020-09-30 04:52:47 +00:00
|
|
|
} else {
|
2021-09-21 15:48:09 +00:00
|
|
|
logger.log("Not setting dehydration key: feature disabled");
|
2020-09-30 04:52:47 +00:00
|
|
|
}
|
2019-12-11 15:05:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// `return await` needed here to ensure `finally` block runs after the
|
|
|
|
// inner operation completes.
|
|
|
|
return await func();
|
2020-10-08 15:35:17 +00:00
|
|
|
} catch (e) {
|
|
|
|
SecurityCustomisations.catchAccessSecretStorageError?.(e);
|
2021-10-15 14:30:53 +00:00
|
|
|
logger.error(e);
|
2021-03-26 13:01:30 +00:00
|
|
|
// Re-throw so that higher level logic can abort as needed
|
|
|
|
throw e;
|
2019-12-11 15:05:03 +00:00
|
|
|
} finally {
|
|
|
|
// Clear secret storage key cache now that work is complete
|
2020-01-30 14:18:12 +00:00
|
|
|
secretStorageBeingAccessed = false;
|
|
|
|
if (!isCachingAllowed()) {
|
|
|
|
secretStorageKeys = {};
|
2020-09-30 04:52:47 +00:00
|
|
|
secretStorageKeyInfo = {};
|
2020-01-30 14:18:12 +00:00
|
|
|
}
|
2019-12-11 15:05:03 +00:00
|
|
|
}
|
|
|
|
}
|
2020-10-02 00:23:12 +00:00
|
|
|
|
|
|
|
// FIXME: this function name is a bit of a mouthful
|
2020-10-09 15:59:56 +00:00
|
|
|
export async function tryToUnlockSecretStorageWithDehydrationKey(client: MatrixClient): Promise<void> {
|
2020-10-02 00:23:12 +00:00
|
|
|
const key = dehydrationCache.key;
|
|
|
|
let restoringBackup = false;
|
2021-09-21 15:48:09 +00:00
|
|
|
if (key && (await client.isSecretStorageReady())) {
|
|
|
|
logger.log("Trying to set up cross-signing using dehydration key");
|
2020-10-02 00:23:12 +00:00
|
|
|
secretStorageBeingAccessed = true;
|
|
|
|
nonInteractive = true;
|
|
|
|
try {
|
|
|
|
await client.checkOwnCrossSigningTrust();
|
|
|
|
|
|
|
|
// we also need to set a new dehydrated device to replace the
|
|
|
|
// device we rehydrated
|
2020-10-09 15:59:56 +00:00
|
|
|
let dehydrationKeyInfo = {};
|
|
|
|
if (dehydrationCache.keyInfo && dehydrationCache.keyInfo.passphrase) {
|
|
|
|
dehydrationKeyInfo = { passphrase: dehydrationCache.keyInfo.passphrase };
|
|
|
|
}
|
2020-10-02 01:41:03 +00:00
|
|
|
await client.setDehydrationKey(key, dehydrationKeyInfo, "Backup device");
|
2020-10-02 00:23:12 +00:00
|
|
|
|
|
|
|
// and restore from backup
|
|
|
|
const backupInfo = await client.getKeyBackupVersion();
|
|
|
|
if (backupInfo) {
|
|
|
|
restoringBackup = true;
|
|
|
|
// don't await, because this can take a long time
|
|
|
|
client.restoreKeyBackupWithSecretStorage(backupInfo).finally(() => {
|
|
|
|
secretStorageBeingAccessed = false;
|
|
|
|
nonInteractive = false;
|
|
|
|
if (!isCachingAllowed()) {
|
|
|
|
secretStorageKeys = {};
|
|
|
|
secretStorageKeyInfo = {};
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
} finally {
|
|
|
|
dehydrationCache = {};
|
|
|
|
// the secret storage cache is needed for restoring from backup, so
|
|
|
|
// don't clear it yet if we're restoring from backup
|
|
|
|
if (!restoringBackup) {
|
|
|
|
secretStorageBeingAccessed = false;
|
|
|
|
nonInteractive = false;
|
|
|
|
if (!isCachingAllowed()) {
|
|
|
|
secretStorageKeys = {};
|
|
|
|
secretStorageKeyInfo = {};
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|