2016-01-19 16:36:54 +00:00
|
|
|
/*
|
|
|
|
Copyright 2016 OpenMarket Ltd
|
2017-03-16 14:56:26 +00:00
|
|
|
Copyright 2017 Vector Creations Ltd
|
2019-09-19 14:50:18 +00:00
|
|
|
Copyright 2019 The Matrix.org Foundation C.I.C.
|
2016-01-19 16:36:54 +00:00
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2017-07-01 13:21:28 +00:00
|
|
|
import MatrixClientPeg from './MatrixClientPeg';
|
2017-05-25 10:39:08 +00:00
|
|
|
import { _t } from './languageHandler';
|
2019-07-29 14:34:50 +00:00
|
|
|
import IdentityAuthClient from './IdentityAuthClient';
|
2016-01-19 16:36:54 +00:00
|
|
|
|
|
|
|
/**
|
2019-02-01 00:52:39 +00:00
|
|
|
* Allows a user to add a third party identifier to their homeserver and,
|
2016-01-19 16:36:54 +00:00
|
|
|
* optionally, the identity servers.
|
|
|
|
*
|
|
|
|
* This involves getting an email token from the identity server to "prove" that
|
2017-01-20 14:22:27 +00:00
|
|
|
* the client owns the given email address, which is then passed to the
|
2016-01-19 16:36:54 +00:00
|
|
|
* add threepid API on the homeserver.
|
2019-09-20 10:49:32 +00:00
|
|
|
*
|
|
|
|
* Diagrams of the intended API flows here are available at:
|
|
|
|
*
|
|
|
|
* https://gist.github.com/jryans/839a09bf0c5a70e2f36ed990d50ed928
|
2016-01-19 16:36:54 +00:00
|
|
|
*/
|
2019-01-22 22:18:14 +00:00
|
|
|
export default class AddThreepid {
|
2016-01-19 16:36:54 +00:00
|
|
|
constructor() {
|
|
|
|
this.clientSecret = MatrixClientPeg.get().generateClientSecret();
|
2019-09-23 11:21:25 +00:00
|
|
|
this.sessionId = null;
|
|
|
|
this.submitUrl = null;
|
2016-01-19 16:36:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2019-09-19 14:50:18 +00:00
|
|
|
* Attempt to add an email threepid to the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an email to the provided email address.
|
2016-01-19 16:36:54 +00:00
|
|
|
* @param {string} emailAddress The email address to add
|
|
|
|
* @return {Promise} Resolves when the email has been sent. Then call checkEmailLinkClicked().
|
|
|
|
*/
|
2019-09-19 14:50:18 +00:00
|
|
|
addEmailAddress(emailAddress) {
|
2016-07-08 16:53:06 +00:00
|
|
|
return MatrixClientPeg.get().requestAdd3pidEmailToken(emailAddress, this.clientSecret, 1).then((res) => {
|
2016-01-19 16:36:54 +00:00
|
|
|
this.sessionId = res.sid;
|
|
|
|
return res;
|
|
|
|
}, function(err) {
|
2017-07-01 13:21:28 +00:00
|
|
|
if (err.errcode === 'M_THREEPID_IN_USE') {
|
2017-05-23 14:16:31 +00:00
|
|
|
err.message = _t('This email address is already in use');
|
2016-07-08 16:28:04 +00:00
|
|
|
} else if (err.httpStatus) {
|
2016-01-19 16:36:54 +00:00
|
|
|
err.message = err.message + ` (Status ${err.httpStatus})`;
|
|
|
|
}
|
|
|
|
throw err;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2017-03-16 14:56:26 +00:00
|
|
|
/**
|
2019-09-19 14:50:18 +00:00
|
|
|
* Attempt to bind an email threepid on the identity server via the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an email to the provided email address.
|
|
|
|
* @param {string} emailAddress The email address to add
|
|
|
|
* @return {Promise} Resolves when the email has been sent. Then call checkEmailLinkClicked().
|
|
|
|
*/
|
2019-09-20 10:49:32 +00:00
|
|
|
async bindEmailAddress(emailAddress) {
|
2019-09-19 14:50:18 +00:00
|
|
|
this.bind = true;
|
2019-09-20 10:49:32 +00:00
|
|
|
if (await MatrixClientPeg.get().doesServerSupportSeparateAddAndBind()) {
|
|
|
|
// For separate bind, request a token directly from the IS.
|
|
|
|
const authClient = new IdentityAuthClient();
|
|
|
|
const identityAccessToken = await authClient.getAccessToken();
|
|
|
|
return MatrixClientPeg.get().requestEmailToken(
|
|
|
|
emailAddress, this.clientSecret, 1,
|
|
|
|
undefined, undefined, identityAccessToken,
|
|
|
|
).then((res) => {
|
|
|
|
this.sessionId = res.sid;
|
|
|
|
return res;
|
|
|
|
}, function(err) {
|
|
|
|
if (err.errcode === 'M_THREEPID_IN_USE') {
|
|
|
|
err.message = _t('This email address is already in use');
|
|
|
|
} else if (err.httpStatus) {
|
|
|
|
err.message = err.message + ` (Status ${err.httpStatus})`;
|
|
|
|
}
|
|
|
|
throw err;
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
// For tangled bind, request a token via the HS.
|
|
|
|
return this.addEmailAddress(emailAddress);
|
|
|
|
}
|
2019-09-19 14:50:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Attempt to add a MSISDN threepid to the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an SMS to the provided phone number.
|
2017-03-22 12:00:16 +00:00
|
|
|
* @param {string} phoneCountry The ISO 2 letter code of the country to resolve phoneNumber in
|
|
|
|
* @param {string} phoneNumber The national or international formatted phone number to add
|
2017-03-16 14:56:26 +00:00
|
|
|
* @return {Promise} Resolves when the text message has been sent. Then call haveMsisdnToken().
|
|
|
|
*/
|
2019-09-19 14:50:18 +00:00
|
|
|
addMsisdn(phoneCountry, phoneNumber) {
|
2017-03-16 14:56:26 +00:00
|
|
|
return MatrixClientPeg.get().requestAdd3pidMsisdnToken(
|
|
|
|
phoneCountry, phoneNumber, this.clientSecret, 1,
|
|
|
|
).then((res) => {
|
|
|
|
this.sessionId = res.sid;
|
2019-09-23 11:21:25 +00:00
|
|
|
this.submitUrl = res.submit_url;
|
2017-03-16 14:56:26 +00:00
|
|
|
return res;
|
|
|
|
}, function(err) {
|
2017-07-01 13:21:28 +00:00
|
|
|
if (err.errcode === 'M_THREEPID_IN_USE') {
|
2017-05-23 14:16:31 +00:00
|
|
|
err.message = _t('This phone number is already in use');
|
2017-03-16 14:56:26 +00:00
|
|
|
} else if (err.httpStatus) {
|
|
|
|
err.message = err.message + ` (Status ${err.httpStatus})`;
|
|
|
|
}
|
|
|
|
throw err;
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2019-09-19 14:50:18 +00:00
|
|
|
/**
|
|
|
|
* Attempt to bind a MSISDN threepid on the identity server via the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an SMS to the provided phone number.
|
|
|
|
* @param {string} phoneCountry The ISO 2 letter code of the country to resolve phoneNumber in
|
|
|
|
* @param {string} phoneNumber The national or international formatted phone number to add
|
|
|
|
* @return {Promise} Resolves when the text message has been sent. Then call haveMsisdnToken().
|
|
|
|
*/
|
2019-09-20 11:45:22 +00:00
|
|
|
async bindMsisdn(phoneCountry, phoneNumber) {
|
2019-09-19 14:50:18 +00:00
|
|
|
this.bind = true;
|
2019-09-20 11:45:22 +00:00
|
|
|
if (await MatrixClientPeg.get().doesServerSupportSeparateAddAndBind()) {
|
|
|
|
// For separate bind, request a token directly from the IS.
|
|
|
|
const authClient = new IdentityAuthClient();
|
|
|
|
const identityAccessToken = await authClient.getAccessToken();
|
|
|
|
return MatrixClientPeg.get().requestMsisdnToken(
|
|
|
|
phoneCountry, phoneNumber, this.clientSecret, 1,
|
|
|
|
undefined, undefined, identityAccessToken,
|
|
|
|
).then((res) => {
|
|
|
|
this.sessionId = res.sid;
|
|
|
|
return res;
|
|
|
|
}, function(err) {
|
|
|
|
if (err.errcode === 'M_THREEPID_IN_USE') {
|
|
|
|
err.message = _t('This phone number is already in use');
|
|
|
|
} else if (err.httpStatus) {
|
|
|
|
err.message = err.message + ` (Status ${err.httpStatus})`;
|
|
|
|
}
|
|
|
|
throw err;
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
// For tangled bind, request a token via the HS.
|
|
|
|
return this.addMsisdn(phoneCountry, phoneNumber);
|
|
|
|
}
|
2019-09-19 14:50:18 +00:00
|
|
|
}
|
|
|
|
|
2016-01-19 16:36:54 +00:00
|
|
|
/**
|
|
|
|
* Checks if the email link has been clicked by attempting to add the threepid
|
2017-03-16 14:56:26 +00:00
|
|
|
* @return {Promise} Resolves if the email address was added. Rejects with an object
|
2016-01-19 16:36:54 +00:00
|
|
|
* with a "message" property which contains a human-readable message detailing why
|
2017-03-16 14:56:26 +00:00
|
|
|
* the request failed.
|
2016-01-19 16:36:54 +00:00
|
|
|
*/
|
2019-09-20 10:49:32 +00:00
|
|
|
async checkEmailLinkClicked() {
|
2017-07-01 13:21:28 +00:00
|
|
|
const identityServerDomain = MatrixClientPeg.get().idBaseUrl.split("://")[1];
|
2019-09-20 10:49:32 +00:00
|
|
|
try {
|
|
|
|
if (await MatrixClientPeg.get().doesServerSupportSeparateAddAndBind()) {
|
|
|
|
if (this.bind) {
|
|
|
|
const authClient = new IdentityAuthClient();
|
|
|
|
const identityAccessToken = await authClient.getAccessToken();
|
|
|
|
await MatrixClientPeg.get().bindThreePid({
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
|
|
|
id_server: identityServerDomain,
|
|
|
|
id_access_token: identityAccessToken,
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
await MatrixClientPeg.get().addThreePidOnly({
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
|
|
|
});
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
await MatrixClientPeg.get().addThreePid({
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
|
|
|
id_server: identityServerDomain,
|
|
|
|
}, this.bind);
|
|
|
|
}
|
|
|
|
} catch (err) {
|
2016-01-19 16:36:54 +00:00
|
|
|
if (err.httpStatus === 401) {
|
2017-05-23 14:16:31 +00:00
|
|
|
err.message = _t('Failed to verify email address: make sure you clicked the link in the email');
|
2017-07-01 13:21:28 +00:00
|
|
|
} else if (err.httpStatus) {
|
2016-01-19 16:36:54 +00:00
|
|
|
err.message += ` (Status ${err.httpStatus})`;
|
|
|
|
}
|
|
|
|
throw err;
|
2019-09-20 10:49:32 +00:00
|
|
|
}
|
2016-01-19 16:36:54 +00:00
|
|
|
}
|
2017-03-16 14:56:26 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Takes a phone number verification code as entered by the user and validates
|
|
|
|
* it with the ID server, then if successful, adds the phone number.
|
2019-07-29 14:34:50 +00:00
|
|
|
* @param {string} msisdnToken phone number verification code as entered by the user
|
2017-03-22 12:00:16 +00:00
|
|
|
* @return {Promise} Resolves if the phone number was added. Rejects with an object
|
2017-03-16 14:56:26 +00:00
|
|
|
* with a "message" property which contains a human-readable message detailing why
|
|
|
|
* the request failed.
|
|
|
|
*/
|
2019-07-29 14:34:50 +00:00
|
|
|
async haveMsisdnToken(msisdnToken) {
|
|
|
|
const authClient = new IdentityAuthClient();
|
2019-09-23 11:21:25 +00:00
|
|
|
|
|
|
|
let result;
|
|
|
|
if (this.submitUrl) {
|
|
|
|
result = await MatrixClientPeg.get().submitMsisdnTokenOtherUrl(
|
|
|
|
this.submitUrl,
|
|
|
|
this.sessionId,
|
|
|
|
this.clientSecret,
|
|
|
|
msisdnToken,
|
|
|
|
);
|
|
|
|
} else {
|
|
|
|
result = await MatrixClientPeg.get().submitMsisdnToken(
|
|
|
|
this.sessionId,
|
|
|
|
this.clientSecret,
|
|
|
|
msisdnToken,
|
2019-09-23 11:28:41 +00:00
|
|
|
await authClient.getAccessToken(),
|
2019-09-23 11:21:25 +00:00
|
|
|
);
|
|
|
|
}
|
2019-07-29 14:31:21 +00:00
|
|
|
if (result.errcode) {
|
|
|
|
throw result;
|
|
|
|
}
|
|
|
|
|
|
|
|
const identityServerDomain = MatrixClientPeg.get().idBaseUrl.split("://")[1];
|
2019-09-20 11:45:22 +00:00
|
|
|
if (await MatrixClientPeg.get().doesServerSupportSeparateAddAndBind()) {
|
|
|
|
if (this.bind) {
|
|
|
|
await MatrixClientPeg.get().bindThreePid({
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
|
|
|
id_server: identityServerDomain,
|
2019-09-23 11:28:41 +00:00
|
|
|
id_access_token: await authClient.getAccessToken(),
|
2019-09-20 11:45:22 +00:00
|
|
|
});
|
|
|
|
} else {
|
|
|
|
await MatrixClientPeg.get().addThreePidOnly({
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
|
|
|
});
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
await MatrixClientPeg.get().addThreePid({
|
|
|
|
sid: this.sessionId,
|
|
|
|
client_secret: this.clientSecret,
|
|
|
|
id_server: identityServerDomain,
|
|
|
|
}, this.bind);
|
|
|
|
}
|
2017-03-16 14:56:26 +00:00
|
|
|
}
|
2016-01-19 16:36:54 +00:00
|
|
|
}
|