mail/src/js/controller/login/login-new-device.js

119 lines
4.1 KiB
JavaScript
Raw Normal View History

2014-10-02 16:05:44 -04:00
'use strict';
2013-10-21 07:10:42 -04:00
2015-02-20 11:55:11 -05:00
var LoginExistingCtrl = function($scope, $location, $routeParams, $q, email, auth, pgp, keychain, publickeyVerifier) {
!$routeParams.dev && !auth.isInitialized() && $location.path('/'); // init app
2013-10-22 11:32:30 -04:00
2014-10-02 16:05:44 -04:00
$scope.incorrect = false;
2013-10-22 08:48:38 -04:00
var PRIV_KEY_PREFIX = '-----BEGIN PGP PRIVATE KEY BLOCK-----';
var PUB_KEY_PREFIX = '-----BEGIN PGP PUBLIC KEY BLOCK-----';
var PRIV_ERR_MSG = 'Cannot find private PGP key block!';
$scope.pasteKey = function(pasted) {
var index = pasted.indexOf(PRIV_KEY_PREFIX);
if (index === -1) {
$scope.errMsg = PRIV_ERR_MSG;
return;
}
$scope.errMsg = undefined; // reset error msg
$scope.key = {
privateKeyArmored: pasted.substring(index, pasted.length).trim()
};
};
2014-10-02 16:05:44 -04:00
$scope.confirmPassphrase = function() {
if ($scope.form.$invalid || !$scope.key) {
$scope.errMsg = PRIV_ERR_MSG;
return;
}
var userId = auth.emailAddress,
2015-02-20 11:55:11 -05:00
pubKeyNeedsVerification = false,
keypair;
return $q(function(resolve) {
$scope.busy = true;
$scope.errMsg = undefined; // reset error msg
$scope.incorrect = false;
resolve();
2013-10-22 08:48:38 -04:00
}).then(function() {
// check if user already has a public key on the key server
return keychain.getUserKeyPair(userId);
}).then(function(keys) {
keypair = keys || {};
2014-10-02 16:05:44 -04:00
// extract public key from private key block if missing in key file
if (!$scope.key.publicKeyArmored || $scope.key.publicKeyArmored.indexOf(PUB_KEY_PREFIX) < 0) {
try {
2014-10-02 16:05:44 -04:00
$scope.key.publicKeyArmored = pgp.extractPublicKey($scope.key.privateKeyArmored);
} catch (e) {
throw new Error('Cannot find public PGP key!');
}
2014-10-02 16:05:44 -04:00
}
2014-10-02 16:05:44 -04:00
// parse keypair params
var privKeyParams, pubKeyParams;
try {
privKeyParams = pgp.getKeyParams($scope.key.privateKeyArmored);
pubKeyParams = pgp.getKeyParams($scope.key.publicKeyArmored);
} catch (e) {
throw new Error('Error reading key paramaters!');
2014-10-02 16:05:44 -04:00
}
// set parsed private key
keypair.privateKey = {
_id: privKeyParams._id,
userId: userId,
userIds: privKeyParams.userIds,
encryptedKey: $scope.key.privateKeyArmored
};
if (!keypair.publicKey) {
// there is no public key on the key server yet... use parsed
keypair.publicKey = {
_id: pubKeyParams._id,
2013-11-04 08:20:14 -05:00
userId: userId,
2014-10-02 16:05:44 -04:00
userIds: pubKeyParams.userIds,
publicKey: $scope.key.publicKeyArmored
2013-11-04 08:20:14 -05:00
};
2015-02-20 11:55:11 -05:00
pubKeyNeedsVerification = true; // this public key needs to be authenticated
2014-10-02 16:05:44 -04:00
}
2013-11-04 08:20:14 -05:00
2014-10-02 16:05:44 -04:00
// import and validate keypair
return email.unlock({
2014-10-02 16:05:44 -04:00
keypair: keypair,
passphrase: $scope.passphrase
}).catch(function(err) {
$scope.incorrect = true;
throw err;
2013-11-04 08:20:14 -05:00
});
2014-10-02 16:05:44 -04:00
2015-02-20 11:55:11 -05:00
}).then(function(keypair) {
if (!pubKeyNeedsVerification) {
// persist credentials and key and go to main account screen
return keychain.putUserKeyPair(keypair).then(function() {
return auth.storeCredentials();
}).then(function() {
$location.path('/account');
});
}
2013-10-21 07:10:42 -04:00
// remember keypair for public key verification
2015-02-20 11:55:11 -05:00
publickeyVerifier.keypair = keypair;
// upload private key and then go to public key verification
$location.path('/login-privatekey-upload');
}).catch(displayError);
};
function displayError(err) {
$scope.busy = false;
$scope.errMsg = err.errMsg || err.message;
}
2014-10-02 16:05:44 -04:00
};
2014-10-08 06:34:34 -04:00
module.exports = LoginExistingCtrl;