|
| 1 | +/* |
| 2 | + * Copyright 2025 New Vector Ltd. |
| 3 | + * |
| 4 | + * SPDX-License-Identifier: AGPL-3.0-only OR GPL-3.0-only OR LicenseRef-Element-Commercial |
| 5 | + * Please see LICENSE files in the repository root for full details. |
| 6 | + */ |
| 7 | + |
| 8 | +import React, { JSX } from "react"; |
| 9 | +import { InlineSpinner } from "@vector-im/compound-web"; |
| 10 | + |
| 11 | +import { useMatrixClientContext } from "../../../../contexts/MatrixClientContext"; |
| 12 | +import BaseTool from "./BaseTool"; |
| 13 | +import { useAsyncMemo } from "../../../../hooks/useAsyncMemo"; |
| 14 | +import { _t } from "../../../../languageHandler"; |
| 15 | + |
| 16 | +interface KeyBackupProps { |
| 17 | + onBack(): void; |
| 18 | +} |
| 19 | + |
| 20 | +export function Crypto({ onBack }: KeyBackupProps): JSX.Element { |
| 21 | + return ( |
| 22 | + <BaseTool onBack={onBack} className="mx_Crypto"> |
| 23 | + <KeyStorage /> |
| 24 | + <CrossSigning /> |
| 25 | + </BaseTool> |
| 26 | + ); |
| 27 | +} |
| 28 | + |
| 29 | +/** |
| 30 | + * A component that displays information about the key storage. |
| 31 | + */ |
| 32 | +function KeyStorage(): JSX.Element { |
| 33 | + const matrixClient = useMatrixClientContext(); |
| 34 | + const keyStorageData = useAsyncMemo(async () => { |
| 35 | + const crypto = matrixClient.getCrypto(); |
| 36 | + if (!crypto) return null; |
| 37 | + |
| 38 | + const backupInfo = await crypto.getKeyBackupInfo(); |
| 39 | + const backupKeyStored = Boolean(await matrixClient.isKeyBackupKeyStored()); |
| 40 | + const backupKeyFromCache = await crypto.getSessionBackupPrivateKey(); |
| 41 | + const backupKeyCached = Boolean(backupKeyFromCache); |
| 42 | + const backupKeyWellFormed = backupKeyFromCache instanceof Uint8Array; |
| 43 | + const activeBackupVersion = await crypto.getActiveSessionBackupVersion(); |
| 44 | + const secretStorageKeyInAccount = await matrixClient.secretStorage.hasKey(); |
| 45 | + const secretStorageReady = await crypto.isSecretStorageReady(); |
| 46 | + |
| 47 | + return { |
| 48 | + backupInfo, |
| 49 | + backupKeyStored, |
| 50 | + backupKeyCached, |
| 51 | + backupKeyWellFormed, |
| 52 | + activeBackupVersion, |
| 53 | + secretStorageKeyInAccount, |
| 54 | + secretStorageReady, |
| 55 | + }; |
| 56 | + }, [matrixClient]); |
| 57 | + |
| 58 | + if (keyStorageData === undefined) return <InlineSpinner aria-label={_t("common|loading")} />; |
| 59 | + if (keyStorageData === null) return <span>{_t("devtools|crypto|crypto_not_available")}</span>; |
| 60 | + |
| 61 | + const { |
| 62 | + backupInfo, |
| 63 | + backupKeyStored, |
| 64 | + backupKeyCached, |
| 65 | + backupKeyWellFormed, |
| 66 | + activeBackupVersion, |
| 67 | + secretStorageKeyInAccount, |
| 68 | + secretStorageReady, |
| 69 | + } = keyStorageData; |
| 70 | + |
| 71 | + return ( |
| 72 | + <table className="mx_KeyStorage"> |
| 73 | + <thead>{_t("devtools|crypto|key_storage")}</thead> |
| 74 | + <tbody> |
| 75 | + <tr> |
| 76 | + <th scope="row">{_t("devtools|crypto|key_backup_latest_version")}</th> |
| 77 | + <td> |
| 78 | + {backupInfo |
| 79 | + ? `${backupInfo.version} (${_t("settings|security|key_backup_algorithm")} ${backupInfo.algorithm})` |
| 80 | + : _t("devtools|crypto|key_backup_inactive_warning")} |
| 81 | + </td> |
| 82 | + </tr> |
| 83 | + <tr> |
| 84 | + <th scope="row">{_t("devtools|crypto|backup_key_stored_status")}</th> |
| 85 | + <td> |
| 86 | + {backupKeyStored |
| 87 | + ? _t("devtools|crypto|backup_key_stored") |
| 88 | + : _t("devtools|crypto|backup_key_not_stored")} |
| 89 | + </td> |
| 90 | + </tr> |
| 91 | + <tr> |
| 92 | + <th scope="row">{_t("devtools|crypto|key_backup_active_version")}</th> |
| 93 | + <td> |
| 94 | + {activeBackupVersion === null |
| 95 | + ? _t("devtools|crypto|key_backup_active_version_none") |
| 96 | + : activeBackupVersion} |
| 97 | + </td> |
| 98 | + </tr> |
| 99 | + <tr> |
| 100 | + <th scope="row">{_t("devtools|crypto|backup_key_cached_status")}</th> |
| 101 | + <td> |
| 102 | + {`${ |
| 103 | + backupKeyCached |
| 104 | + ? _t("devtools|crypto|backup_key_cached") |
| 105 | + : _t("devtools|crypto|not_found_locally") |
| 106 | + }, |
| 107 | + ${ |
| 108 | + backupKeyWellFormed |
| 109 | + ? _t("devtools|crypto|backup_key_well_formed") |
| 110 | + : _t("devtools|crypto|backup_key_unexpected_type") |
| 111 | + }`} |
| 112 | + </td> |
| 113 | + </tr> |
| 114 | + <tr> |
| 115 | + <th scope="row">{_t("devtools|crypto|4s_public_key_status")}</th> |
| 116 | + <td> |
| 117 | + {secretStorageKeyInAccount |
| 118 | + ? _t("devtools|crypto|4s_public_key_in_account_data") |
| 119 | + : _t("devtools|crypto|4s_public_key_not_in_account_data")} |
| 120 | + </td> |
| 121 | + </tr> |
| 122 | + <tr> |
| 123 | + <th scope="row">{_t("devtools|crypto|secret_storage_status")}</th> |
| 124 | + <td> |
| 125 | + {secretStorageReady |
| 126 | + ? _t("devtools|crypto|secret_storage_ready") |
| 127 | + : _t("devtools|crypto|secret_storage_not_ready")} |
| 128 | + </td> |
| 129 | + </tr> |
| 130 | + </tbody> |
| 131 | + </table> |
| 132 | + ); |
| 133 | +} |
| 134 | + |
| 135 | +type CrossSigningData = { |
| 136 | + crossSigningPublicKeysOnDevice: boolean; |
| 137 | + crossSigningPrivateKeysInStorage: boolean; |
| 138 | + masterPrivateKeyCached: boolean; |
| 139 | + selfSigningPrivateKeyCached: boolean; |
| 140 | + userSigningPrivateKeyCached: boolean; |
| 141 | + homeserverSupportsCrossSigning: boolean; |
| 142 | + crossSigningReady: boolean; |
| 143 | +}; |
| 144 | + |
| 145 | +/** |
| 146 | + * A component that displays information about cross-signing. |
| 147 | + */ |
| 148 | +function CrossSigning(): JSX.Element { |
| 149 | + const matrixClient = useMatrixClientContext(); |
| 150 | + const crossSigningData = useAsyncMemo<CrossSigningData | null>(async () => { |
| 151 | + const crypto = matrixClient.getCrypto(); |
| 152 | + if (!crypto) return null; |
| 153 | + |
| 154 | + const crossSigningStatus = await crypto.getCrossSigningStatus(); |
| 155 | + const crossSigningPublicKeysOnDevice = crossSigningStatus.publicKeysOnDevice; |
| 156 | + const crossSigningPrivateKeysInStorage = crossSigningStatus.privateKeysInSecretStorage; |
| 157 | + const masterPrivateKeyCached = crossSigningStatus.privateKeysCachedLocally.masterKey; |
| 158 | + const selfSigningPrivateKeyCached = crossSigningStatus.privateKeysCachedLocally.selfSigningKey; |
| 159 | + const userSigningPrivateKeyCached = crossSigningStatus.privateKeysCachedLocally.userSigningKey; |
| 160 | + const homeserverSupportsCrossSigning = |
| 161 | + await matrixClient.doesServerSupportUnstableFeature("org.matrix.e2e_cross_signing"); |
| 162 | + const crossSigningReady = await crypto.isCrossSigningReady(); |
| 163 | + |
| 164 | + return { |
| 165 | + crossSigningPublicKeysOnDevice, |
| 166 | + crossSigningPrivateKeysInStorage, |
| 167 | + masterPrivateKeyCached, |
| 168 | + selfSigningPrivateKeyCached, |
| 169 | + userSigningPrivateKeyCached, |
| 170 | + homeserverSupportsCrossSigning, |
| 171 | + crossSigningReady, |
| 172 | + }; |
| 173 | + }, [matrixClient]); |
| 174 | + |
| 175 | + if (crossSigningData === undefined) return <InlineSpinner aria-label={_t("common|loading")} />; |
| 176 | + if (crossSigningData === null) return <span>{_t("devtools|crypto|crypto_not_available")}</span>; |
| 177 | + |
| 178 | + const { |
| 179 | + crossSigningPublicKeysOnDevice, |
| 180 | + crossSigningPrivateKeysInStorage, |
| 181 | + masterPrivateKeyCached, |
| 182 | + selfSigningPrivateKeyCached, |
| 183 | + userSigningPrivateKeyCached, |
| 184 | + homeserverSupportsCrossSigning, |
| 185 | + } = crossSigningData; |
| 186 | + |
| 187 | + return ( |
| 188 | + <table className="mx_CrossSigning"> |
| 189 | + <thead>{_t("devtools|crypto|cross_signing")}</thead> |
| 190 | + <tbody> |
| 191 | + <tr> |
| 192 | + <th scope="row">{_t("devtools|crypto|cross_signing_status")}</th> |
| 193 | + <td>{getCrossSigningStatus(crossSigningData)}</td> |
| 194 | + </tr> |
| 195 | + <tr> |
| 196 | + <th scope="row">{_t("devtools|crypto|cross_signing_public_keys_on_device_status")}</th> |
| 197 | + <td> |
| 198 | + {crossSigningPublicKeysOnDevice |
| 199 | + ? _t("devtools|crypto|cross_signing_public_keys_on_device") |
| 200 | + : _t("devtools|crypto|not_found")} |
| 201 | + </td> |
| 202 | + </tr> |
| 203 | + <tr> |
| 204 | + <th scope="row">{_t("devtools|crypto|cross_signing_private_keys_in_storage_status")}</th> |
| 205 | + <td> |
| 206 | + {crossSigningPrivateKeysInStorage |
| 207 | + ? _t("devtools|crypto|cross_signing_private_keys_in_storage") |
| 208 | + : _t("devtools|crypto|cross_signing_private_keys_not_in_storage")} |
| 209 | + </td> |
| 210 | + </tr> |
| 211 | + <tr> |
| 212 | + <th scope="row">{_t("devtools|crypto|master_private_key_cached_status")}</th> |
| 213 | + <td> |
| 214 | + {masterPrivateKeyCached |
| 215 | + ? _t("devtools|crypto|cross_signing_cached") |
| 216 | + : _t("devtools|crypto|not_found_locally")} |
| 217 | + </td> |
| 218 | + </tr> |
| 219 | + <tr> |
| 220 | + <th scope="row">{_t("devtools|crypto|self_signing_private_key_cached_status")}</th> |
| 221 | + <td> |
| 222 | + {selfSigningPrivateKeyCached |
| 223 | + ? _t("devtools|crypto|cross_signing_cached") |
| 224 | + : _t("devtools|crypto|not_found_locally")} |
| 225 | + </td> |
| 226 | + </tr> |
| 227 | + <tr> |
| 228 | + <th scope="row">{_t("devtools|crypto|user_signing_private_key_cached_status")}</th> |
| 229 | + <td> |
| 230 | + {userSigningPrivateKeyCached |
| 231 | + ? _t("devtools|crypto|cross_signing_cached") |
| 232 | + : _t("devtools|crypto|not_found_locally")} |
| 233 | + </td> |
| 234 | + </tr> |
| 235 | + <tr> |
| 236 | + <th scope="row">{_t("devtools|crypto|homeserver_supports_cross_signing_status")}</th> |
| 237 | + <td> |
| 238 | + {homeserverSupportsCrossSigning |
| 239 | + ? _t("devtools|crypto|homeserver_supports_cross_signing") |
| 240 | + : _t("devtools|crypto|not_found")} |
| 241 | + </td> |
| 242 | + </tr> |
| 243 | + </tbody> |
| 244 | + </table> |
| 245 | + ); |
| 246 | +} |
| 247 | + |
| 248 | +function getCrossSigningStatus({ |
| 249 | + homeserverSupportsCrossSigning, |
| 250 | + crossSigningReady, |
| 251 | + crossSigningPrivateKeysInStorage, |
| 252 | +}: CrossSigningData): string { |
| 253 | + if (!homeserverSupportsCrossSigning) { |
| 254 | + return _t("devtools|crypto|cross_signing_unsupported"); |
| 255 | + } else if (crossSigningReady && crossSigningPrivateKeysInStorage) { |
| 256 | + return _t("devtools|crypto|cross_signing_ready"); |
| 257 | + } else if (crossSigningReady && !crossSigningPrivateKeysInStorage) { |
| 258 | + return _t("devtools|crypto|cross_signing_ready_no_backup"); |
| 259 | + } else if (crossSigningPrivateKeysInStorage) { |
| 260 | + return _t("devtools|crypto|cross_signing_untrusted"); |
| 261 | + } else { |
| 262 | + return _t("devtools|crypto|cross_signing_not_ready"); |
| 263 | + } |
| 264 | +} |
0 commit comments