2016-01-19 16:36:54 +00:00
|
|
|
/*
|
|
|
|
Copyright 2016 OpenMarket Ltd
|
2017-03-16 14:56:26 +00:00
|
|
|
Copyright 2017 Vector Creations Ltd
|
2019-09-19 14:50:18 +00:00
|
|
|
Copyright 2019 The Matrix.org Foundation C.I.C.
|
2016-01-19 16:36:54 +00:00
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2023-06-28 10:02:15 +00:00
|
|
|
import {
|
|
|
|
IAddThreePidOnlyBody,
|
|
|
|
IAuthData,
|
|
|
|
IRequestMsisdnTokenResponse,
|
|
|
|
IRequestTokenResponse,
|
|
|
|
MatrixClient,
|
2023-08-03 12:56:30 +00:00
|
|
|
MatrixError,
|
|
|
|
HTTPError,
|
2023-08-23 09:04:25 +00:00
|
|
|
IThreepid,
|
2023-06-28 10:02:15 +00:00
|
|
|
} from "matrix-js-sdk/src/matrix";
|
2021-10-22 22:23:32 +00:00
|
|
|
|
2019-10-08 17:56:13 +00:00
|
|
|
import Modal from "./Modal";
|
2023-04-14 14:40:19 +00:00
|
|
|
import { _t, UserFriendlyError } from "./languageHandler";
|
2019-07-29 14:34:50 +00:00
|
|
|
import IdentityAuthClient from "./IdentityAuthClient";
|
2021-06-29 12:11:58 +00:00
|
|
|
import { SSOAuthEntry } from "./components/views/auth/InteractiveAuthEntryComponents";
|
2023-06-28 10:02:15 +00:00
|
|
|
import InteractiveAuthDialog, { InteractiveAuthDialogProps } from "./components/views/dialogs/InteractiveAuthDialog";
|
2016-01-19 16:36:54 +00:00
|
|
|
|
2023-05-30 09:36:34 +00:00
|
|
|
function getIdServerDomain(matrixClient: MatrixClient): string {
|
|
|
|
const idBaseUrl = matrixClient.getIdentityServerUrl(true);
|
2023-03-10 14:55:06 +00:00
|
|
|
if (!idBaseUrl) {
|
2023-09-22 15:39:40 +00:00
|
|
|
throw new UserFriendlyError("settings|general|identity_server_not_set");
|
2023-03-10 14:55:06 +00:00
|
|
|
}
|
2023-04-14 14:40:19 +00:00
|
|
|
return idBaseUrl;
|
2019-10-07 15:43:17 +00:00
|
|
|
}
|
|
|
|
|
2023-02-13 11:39:16 +00:00
|
|
|
export type Binding = {
|
|
|
|
bind: boolean;
|
|
|
|
label: string;
|
|
|
|
errorTitle: string;
|
|
|
|
};
|
|
|
|
|
2023-07-07 08:02:13 +00:00
|
|
|
// IThreepid modified stripping validated_at and added_at as they aren't necessary for our UI
|
|
|
|
export type ThirdPartyIdentifier = Omit<IThreepid, "validated_at" | "added_at">;
|
|
|
|
|
2016-01-19 16:36:54 +00:00
|
|
|
/**
|
2019-02-01 00:52:39 +00:00
|
|
|
* Allows a user to add a third party identifier to their homeserver and,
|
2016-01-19 16:36:54 +00:00
|
|
|
* optionally, the identity servers.
|
|
|
|
*
|
|
|
|
* This involves getting an email token from the identity server to "prove" that
|
2017-01-20 14:22:27 +00:00
|
|
|
* the client owns the given email address, which is then passed to the
|
2016-01-19 16:36:54 +00:00
|
|
|
* add threepid API on the homeserver.
|
2019-09-20 10:49:32 +00:00
|
|
|
*
|
|
|
|
* Diagrams of the intended API flows here are available at:
|
|
|
|
*
|
|
|
|
* https://gist.github.com/jryans/839a09bf0c5a70e2f36ed990d50ed928
|
2016-01-19 16:36:54 +00:00
|
|
|
*/
|
2019-01-22 22:18:14 +00:00
|
|
|
export default class AddThreepid {
|
2023-06-29 11:17:05 +00:00
|
|
|
private sessionId?: string;
|
2023-02-24 15:28:40 +00:00
|
|
|
private submitUrl?: string;
|
2023-05-16 13:25:43 +00:00
|
|
|
private bind = false;
|
2023-05-30 09:36:34 +00:00
|
|
|
private readonly clientSecret: string;
|
2021-09-27 07:44:30 +00:00
|
|
|
|
2023-05-30 09:36:34 +00:00
|
|
|
public constructor(private readonly matrixClient: MatrixClient) {
|
|
|
|
this.clientSecret = matrixClient.generateClientSecret();
|
2016-01-19 16:36:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2019-09-19 14:50:18 +00:00
|
|
|
* Attempt to add an email threepid to the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an email to the provided email address.
|
2016-01-19 16:36:54 +00:00
|
|
|
* @param {string} emailAddress The email address to add
|
|
|
|
* @return {Promise} Resolves when the email has been sent. Then call checkEmailLinkClicked().
|
|
|
|
*/
|
2023-04-14 14:40:19 +00:00
|
|
|
public async addEmailAddress(emailAddress: string): Promise<IRequestTokenResponse> {
|
|
|
|
try {
|
2023-05-30 09:36:34 +00:00
|
|
|
const res = await this.matrixClient.requestAdd3pidEmailToken(emailAddress, this.clientSecret, 1);
|
2023-04-14 14:40:19 +00:00
|
|
|
this.sessionId = res.sid;
|
|
|
|
return res;
|
|
|
|
} catch (err) {
|
|
|
|
if (err instanceof MatrixError && err.errcode === "M_THREEPID_IN_USE") {
|
2023-09-22 15:39:40 +00:00
|
|
|
throw new UserFriendlyError("settings|general|email_address_in_use", { cause: err });
|
2023-04-14 14:40:19 +00:00
|
|
|
}
|
|
|
|
// Otherwise, just blurt out the same error
|
|
|
|
throw err;
|
|
|
|
}
|
2016-01-19 16:36:54 +00:00
|
|
|
}
|
|
|
|
|
2017-03-16 14:56:26 +00:00
|
|
|
/**
|
2019-09-19 14:50:18 +00:00
|
|
|
* Attempt to bind an email threepid on the identity server via the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an email to the provided email address.
|
|
|
|
* @param {string} emailAddress The email address to add
|
|
|
|
* @return {Promise} Resolves when the email has been sent. Then call checkEmailLinkClicked().
|
|
|
|
*/
|
2021-09-27 07:44:30 +00:00
|
|
|
public async bindEmailAddress(emailAddress: string): Promise<IRequestTokenResponse> {
|
2019-09-19 14:50:18 +00:00
|
|
|
this.bind = true;
|
2023-08-14 08:25:13 +00:00
|
|
|
// For separate bind, request a token directly from the IS.
|
|
|
|
const authClient = new IdentityAuthClient();
|
|
|
|
const identityAccessToken = (await authClient.getAccessToken()) ?? undefined;
|
|
|
|
try {
|
|
|
|
const res = await this.matrixClient.requestEmailToken(
|
|
|
|
emailAddress,
|
|
|
|
this.clientSecret,
|
|
|
|
1,
|
|
|
|
undefined,
|
|
|
|
identityAccessToken,
|
|
|
|
);
|
|
|
|
this.sessionId = res.sid;
|
|
|
|
return res;
|
|
|
|
} catch (err) {
|
|
|
|
if (err instanceof MatrixError && err.errcode === "M_THREEPID_IN_USE") {
|
2023-09-22 15:39:40 +00:00
|
|
|
throw new UserFriendlyError("settings|general|email_address_in_use", { cause: err });
|
2023-04-14 14:40:19 +00:00
|
|
|
}
|
2023-08-14 08:25:13 +00:00
|
|
|
// Otherwise, just blurt out the same error
|
|
|
|
throw err;
|
2019-09-20 10:49:32 +00:00
|
|
|
}
|
2019-09-19 14:50:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Attempt to add a MSISDN threepid to the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an SMS to the provided phone number.
|
2017-03-22 12:00:16 +00:00
|
|
|
* @param {string} phoneCountry The ISO 2 letter code of the country to resolve phoneNumber in
|
|
|
|
* @param {string} phoneNumber The national or international formatted phone number to add
|
2017-03-16 14:56:26 +00:00
|
|
|
* @return {Promise} Resolves when the text message has been sent. Then call haveMsisdnToken().
|
|
|
|
*/
|
2023-04-14 14:40:19 +00:00
|
|
|
public async addMsisdn(phoneCountry: string, phoneNumber: string): Promise<IRequestMsisdnTokenResponse> {
|
|
|
|
try {
|
2023-05-30 09:36:34 +00:00
|
|
|
const res = await this.matrixClient.requestAdd3pidMsisdnToken(
|
2023-04-14 14:40:19 +00:00
|
|
|
phoneCountry,
|
|
|
|
phoneNumber,
|
|
|
|
this.clientSecret,
|
|
|
|
1,
|
2017-03-16 14:56:26 +00:00
|
|
|
);
|
2023-04-14 14:40:19 +00:00
|
|
|
this.sessionId = res.sid;
|
|
|
|
this.submitUrl = res.submit_url;
|
|
|
|
return res;
|
|
|
|
} catch (err) {
|
|
|
|
if (err instanceof MatrixError && err.errcode === "M_THREEPID_IN_USE") {
|
2023-09-22 15:39:40 +00:00
|
|
|
throw new UserFriendlyError("settings|general|msisdn_in_use", { cause: err });
|
2023-04-14 14:40:19 +00:00
|
|
|
}
|
|
|
|
// Otherwise, just blurt out the same error
|
|
|
|
throw err;
|
|
|
|
}
|
2017-03-16 14:56:26 +00:00
|
|
|
}
|
|
|
|
|
2019-09-19 14:50:18 +00:00
|
|
|
/**
|
|
|
|
* Attempt to bind a MSISDN threepid on the identity server via the homeserver.
|
|
|
|
* This will trigger a side-effect of sending an SMS to the provided phone number.
|
|
|
|
* @param {string} phoneCountry The ISO 2 letter code of the country to resolve phoneNumber in
|
|
|
|
* @param {string} phoneNumber The national or international formatted phone number to add
|
|
|
|
* @return {Promise} Resolves when the text message has been sent. Then call haveMsisdnToken().
|
|
|
|
*/
|
2021-09-27 07:44:30 +00:00
|
|
|
public async bindMsisdn(phoneCountry: string, phoneNumber: string): Promise<IRequestMsisdnTokenResponse> {
|
2019-09-19 14:50:18 +00:00
|
|
|
this.bind = true;
|
2023-08-14 08:25:13 +00:00
|
|
|
// For separate bind, request a token directly from the IS.
|
|
|
|
const authClient = new IdentityAuthClient();
|
|
|
|
const identityAccessToken = (await authClient.getAccessToken()) ?? undefined;
|
|
|
|
try {
|
|
|
|
const res = await this.matrixClient.requestMsisdnToken(
|
|
|
|
phoneCountry,
|
|
|
|
phoneNumber,
|
|
|
|
this.clientSecret,
|
|
|
|
1,
|
|
|
|
undefined,
|
|
|
|
identityAccessToken,
|
|
|
|
);
|
|
|
|
this.sessionId = res.sid;
|
|
|
|
return res;
|
|
|
|
} catch (err) {
|
|
|
|
if (err instanceof MatrixError && err.errcode === "M_THREEPID_IN_USE") {
|
2023-09-22 15:39:40 +00:00
|
|
|
throw new UserFriendlyError("settings|general|msisdn_in_use", { cause: err });
|
2023-04-14 14:40:19 +00:00
|
|
|
}
|
2023-08-14 08:25:13 +00:00
|
|
|
// Otherwise, just blurt out the same error
|
|
|
|
throw err;
|
2019-09-20 11:45:22 +00:00
|
|
|
}
|
2019-09-19 14:50:18 +00:00
|
|
|
}
|
|
|
|
|
2016-01-19 16:36:54 +00:00
|
|
|
/**
|
|
|
|
* Checks if the email link has been clicked by attempting to add the threepid
|
2017-03-16 14:56:26 +00:00
|
|
|
* @return {Promise} Resolves if the email address was added. Rejects with an object
|
2016-01-19 16:36:54 +00:00
|
|
|
* with a "message" property which contains a human-readable message detailing why
|
2017-03-16 14:56:26 +00:00
|
|
|
* the request failed.
|
2016-01-19 16:36:54 +00:00
|
|
|
*/
|
2023-02-28 10:31:48 +00:00
|
|
|
public async checkEmailLinkClicked(): Promise<[success?: boolean, result?: IAuthData | Error | null]> {
|
2019-09-20 10:49:32 +00:00
|
|
|
try {
|
2023-08-14 08:25:13 +00:00
|
|
|
if (this.bind) {
|
|
|
|
const authClient = new IdentityAuthClient();
|
|
|
|
const identityAccessToken = await authClient.getAccessToken();
|
|
|
|
if (!identityAccessToken) {
|
2023-09-22 15:39:40 +00:00
|
|
|
throw new UserFriendlyError("settings|general|identity_server_no_token");
|
2023-08-14 08:25:13 +00:00
|
|
|
}
|
|
|
|
await this.matrixClient.bindThreePid({
|
|
|
|
sid: this.sessionId!,
|
|
|
|
client_secret: this.clientSecret,
|
|
|
|
id_server: getIdServerDomain(this.matrixClient),
|
|
|
|
id_access_token: identityAccessToken,
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
try {
|
|
|
|
await this.makeAddThreepidOnlyRequest();
|
2019-10-08 17:56:13 +00:00
|
|
|
|
2023-08-14 08:25:13 +00:00
|
|
|
// The spec has always required this to use UI auth but synapse briefly
|
|
|
|
// implemented it without, so this may just succeed and that's OK.
|
|
|
|
return [true];
|
|
|
|
} catch (err) {
|
|
|
|
if (!(err instanceof MatrixError) || err.httpStatus !== 401 || !err.data || !err.data.flows) {
|
|
|
|
// doesn't look like an interactive-auth failure
|
|
|
|
throw err;
|
2019-10-08 17:56:13 +00:00
|
|
|
}
|
2023-08-14 08:25:13 +00:00
|
|
|
|
|
|
|
const dialogAesthetics = {
|
|
|
|
[SSOAuthEntry.PHASE_PREAUTH]: {
|
2023-09-22 15:39:40 +00:00
|
|
|
title: _t("auth|uia|sso_title"),
|
|
|
|
body: _t("auth|uia|sso_body"),
|
2023-09-12 07:36:06 +00:00
|
|
|
continueText: _t("auth|sso"),
|
2023-08-14 08:25:13 +00:00
|
|
|
continueKind: "primary",
|
|
|
|
},
|
|
|
|
[SSOAuthEntry.PHASE_POSTAUTH]: {
|
2023-09-22 15:39:40 +00:00
|
|
|
title: _t("settings|general|confirm_adding_email_title"),
|
|
|
|
body: _t("settings|general|confirm_adding_email_body"),
|
2023-08-23 10:57:22 +00:00
|
|
|
continueText: _t("action|confirm"),
|
2023-08-14 08:25:13 +00:00
|
|
|
continueKind: "primary",
|
|
|
|
},
|
|
|
|
};
|
|
|
|
const { finished } = Modal.createDialog(InteractiveAuthDialog<{}>, {
|
2023-09-22 15:39:40 +00:00
|
|
|
title: _t("settings|general|add_email_dialog_title"),
|
2023-08-14 08:25:13 +00:00
|
|
|
matrixClient: this.matrixClient,
|
|
|
|
authData: err.data,
|
|
|
|
makeRequest: this.makeAddThreepidOnlyRequest,
|
|
|
|
aestheticsForStagePhases: {
|
|
|
|
[SSOAuthEntry.LOGIN_TYPE]: dialogAesthetics,
|
|
|
|
[SSOAuthEntry.UNSTABLE_LOGIN_TYPE]: dialogAesthetics,
|
|
|
|
},
|
|
|
|
} as InteractiveAuthDialogProps<IAddThreePidOnlyBody>);
|
|
|
|
return finished;
|
2019-09-20 10:49:32 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
} catch (err) {
|
2023-04-14 14:40:19 +00:00
|
|
|
if (err instanceof HTTPError && err.httpStatus === 401) {
|
2023-09-22 15:39:40 +00:00
|
|
|
throw new UserFriendlyError("settings|general|add_email_failed_verification", { cause: err });
|
2016-01-19 16:36:54 +00:00
|
|
|
}
|
2023-04-14 14:40:19 +00:00
|
|
|
// Otherwise, just blurt out the same error
|
2016-01-19 16:36:54 +00:00
|
|
|
throw err;
|
2019-09-20 10:49:32 +00:00
|
|
|
}
|
2023-02-28 10:31:48 +00:00
|
|
|
return [];
|
2016-01-19 16:36:54 +00:00
|
|
|
}
|
2017-03-16 14:56:26 +00:00
|
|
|
|
2019-10-08 17:56:13 +00:00
|
|
|
/**
|
2021-09-27 07:44:30 +00:00
|
|
|
* @param {{type: string, session?: string}} auth UI auth object
|
2019-10-08 17:56:13 +00:00
|
|
|
* @return {Promise<Object>} Response from /3pid/add call (in current spec, an empty object)
|
|
|
|
*/
|
2023-06-28 10:02:15 +00:00
|
|
|
private makeAddThreepidOnlyRequest = (auth?: IAddThreePidOnlyBody["auth"] | null): Promise<{}> => {
|
2023-05-30 09:36:34 +00:00
|
|
|
return this.matrixClient.addThreePidOnly({
|
2023-06-29 11:17:05 +00:00
|
|
|
sid: this.sessionId!,
|
2019-10-08 17:56:13 +00:00
|
|
|
client_secret: this.clientSecret,
|
2023-06-28 10:02:15 +00:00
|
|
|
auth: auth ?? undefined,
|
2019-10-08 17:56:13 +00:00
|
|
|
});
|
2021-09-27 07:44:30 +00:00
|
|
|
};
|
2019-10-08 17:56:13 +00:00
|
|
|
|
2017-03-16 14:56:26 +00:00
|
|
|
/**
|
|
|
|
* Takes a phone number verification code as entered by the user and validates
|
2021-07-13 14:26:38 +00:00
|
|
|
* it with the identity server, then if successful, adds the phone number.
|
2019-07-29 14:34:50 +00:00
|
|
|
* @param {string} msisdnToken phone number verification code as entered by the user
|
2017-03-22 12:00:16 +00:00
|
|
|
* @return {Promise} Resolves if the phone number was added. Rejects with an object
|
2017-03-16 14:56:26 +00:00
|
|
|
* with a "message" property which contains a human-readable message detailing why
|
|
|
|
* the request failed.
|
|
|
|
*/
|
2023-03-10 14:55:06 +00:00
|
|
|
public async haveMsisdnToken(
|
|
|
|
msisdnToken: string,
|
|
|
|
): Promise<[success?: boolean, result?: IAuthData | Error | null] | undefined> {
|
2019-07-29 14:34:50 +00:00
|
|
|
const authClient = new IdentityAuthClient();
|
2019-09-23 11:21:25 +00:00
|
|
|
|
|
|
|
if (this.submitUrl) {
|
2023-08-15 08:43:15 +00:00
|
|
|
await this.matrixClient.submitMsisdnTokenOtherUrl(
|
2019-09-23 11:21:25 +00:00
|
|
|
this.submitUrl,
|
2023-06-29 11:17:05 +00:00
|
|
|
this.sessionId!,
|
2019-09-23 11:21:25 +00:00
|
|
|
this.clientSecret,
|
|
|
|
msisdnToken,
|
|
|
|
);
|
2023-08-14 08:25:13 +00:00
|
|
|
} else if (this.bind) {
|
2023-08-15 08:43:15 +00:00
|
|
|
await this.matrixClient.submitMsisdnToken(
|
2023-06-29 11:17:05 +00:00
|
|
|
this.sessionId!,
|
2019-09-23 11:21:25 +00:00
|
|
|
this.clientSecret,
|
|
|
|
msisdnToken,
|
2019-09-23 11:28:41 +00:00
|
|
|
await authClient.getAccessToken(),
|
2019-09-23 11:21:25 +00:00
|
|
|
);
|
2019-10-31 14:50:21 +00:00
|
|
|
} else {
|
2023-09-22 15:39:40 +00:00
|
|
|
throw new UserFriendlyError("settings|general|add_msisdn_misconfigured");
|
2019-09-23 11:21:25 +00:00
|
|
|
}
|
2019-07-29 14:31:21 +00:00
|
|
|
|
2023-08-14 08:25:13 +00:00
|
|
|
if (this.bind) {
|
|
|
|
await this.matrixClient.bindThreePid({
|
|
|
|
sid: this.sessionId!,
|
|
|
|
client_secret: this.clientSecret,
|
|
|
|
id_server: getIdServerDomain(this.matrixClient),
|
|
|
|
id_access_token: await authClient.getAccessToken(),
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
try {
|
|
|
|
await this.makeAddThreepidOnlyRequest();
|
2019-10-08 18:07:39 +00:00
|
|
|
|
2023-08-14 08:25:13 +00:00
|
|
|
// The spec has always required this to use UI auth but synapse briefly
|
|
|
|
// implemented it without, so this may just succeed and that's OK.
|
|
|
|
return;
|
|
|
|
} catch (err) {
|
|
|
|
if (!(err instanceof MatrixError) || err.httpStatus !== 401 || !err.data || !err.data.flows) {
|
|
|
|
// doesn't look like an interactive-auth failure
|
|
|
|
throw err;
|
2019-10-08 18:07:39 +00:00
|
|
|
}
|
2023-08-14 08:25:13 +00:00
|
|
|
|
|
|
|
const dialogAesthetics = {
|
|
|
|
[SSOAuthEntry.PHASE_PREAUTH]: {
|
2023-09-22 15:39:40 +00:00
|
|
|
title: _t("auth|uia|sso_title"),
|
|
|
|
body: _t("settings|general|add_msisdn_confirm_sso_button"),
|
2023-09-12 07:36:06 +00:00
|
|
|
continueText: _t("auth|sso"),
|
2023-08-14 08:25:13 +00:00
|
|
|
continueKind: "primary",
|
|
|
|
},
|
|
|
|
[SSOAuthEntry.PHASE_POSTAUTH]: {
|
2023-09-22 15:39:40 +00:00
|
|
|
title: _t("settings|general|add_msisdn_confirm_button"),
|
|
|
|
body: _t("settings|general|add_msisdn_confirm_body"),
|
2023-08-23 10:57:22 +00:00
|
|
|
continueText: _t("action|confirm"),
|
2023-08-14 08:25:13 +00:00
|
|
|
continueKind: "primary",
|
|
|
|
},
|
|
|
|
};
|
|
|
|
const { finished } = Modal.createDialog(InteractiveAuthDialog<{}>, {
|
2023-09-22 15:39:40 +00:00
|
|
|
title: _t("settings|general|add_msisdn_dialog_title"),
|
2023-08-14 08:25:13 +00:00
|
|
|
matrixClient: this.matrixClient,
|
|
|
|
authData: err.data,
|
|
|
|
makeRequest: this.makeAddThreepidOnlyRequest,
|
|
|
|
aestheticsForStagePhases: {
|
|
|
|
[SSOAuthEntry.LOGIN_TYPE]: dialogAesthetics,
|
|
|
|
[SSOAuthEntry.UNSTABLE_LOGIN_TYPE]: dialogAesthetics,
|
|
|
|
},
|
|
|
|
} as InteractiveAuthDialogProps<IAddThreePidOnlyBody>);
|
|
|
|
return finished;
|
2019-09-20 11:45:22 +00:00
|
|
|
}
|
|
|
|
}
|
2017-03-16 14:56:26 +00:00
|
|
|
}
|
2016-01-19 16:36:54 +00:00
|
|
|
}
|