Mailspring/internal_packages/keybase/lib/private-key-popover.cjsx

139 lines
4.8 KiB
Text
Raw Normal View History

pgp-plugin update (#2534) * Fix private key email-adder, add "no private key" error The decrypt UI is seriously confusing some people. This commit adds an error message that should at least stop them from trying to decrypt a message without a private key to speak of. Also, there was a dumb hardcoded true in validAddress. * Adds incorrect passphrase notification; enables carriage return for popover The passphrase popover was woefully inadequate. It didn't tell users when they had the wrong password - it just closed without saying anything - and you couldn't even use carriage return to submit the password. This commit fixes those mistakes by buffing out passphrase-popover.cjsx. * Adds private key popover to decrypt button The decrypt UI was confusing and didn't provide the user with an option to get a key imported from the message view. This mondo commit adds an entirely new popover so that the user never again will be forced to go to the preferences page. * Adds more forgiving encrypted block parsing * Overhauls decryption error handling The decrypt UI didn't clearly communicate error messages from the failure in PGPKeyStore.decrypt up to the user. This commit adds nice error surfacing as well as some pretty colors. * Fix encrypt modal key miscount error via getKeyContents coercion On Linux and Windows, fs.watch double-triggers on some actions in the key folder, for reasons that aren't super clear. This was causing issues where the encrypt modal would report not having a key loaded even though the key was totally loaded and saved. This commit sort of kludgily forces the modal to run getKeyContents for every key it has saved right before it returns them all. This would probably be better fixed with a refactor the the PGP Keystore. * remember to close popover, d'oh * patch key picker modal styling for Linux and Windows * response to review
2016-07-09 02:29:10 +08:00
{React, Actions, AccountStore} = require 'nylas-exports'
{remote} = require 'electron'
Identity = require './identity'
PGPKeyStore = require './pgp-key-store'
PassphrasePopover = require './passphrase-popover'
_ = require 'underscore'
fs = require 'fs'
pgp = require 'kbpgp'
module.exports =
class PrivateKeyPopover extends React.Component
constructor: ->
@state = {
selectedAddress: "0"
keyBody: ""
paste: false
import: false
validKeyBody: false
}
@propTypes:
addresses: React.PropTypes.array
render: =>
errorBar = <div className="invalid-key-body">Invalid key body.</div>
keyArea = <textarea value={@state.keyBody || ""} onChange={@_onKeyChange} placeholder="Paste in your PGP key here!"/>
saveBtnClass = if !(@state.validKeyBody) then "btn modal-done-button btn-disabled" else "btn modal-done-button"
saveButton = <button className={saveBtnClass} disabled={!(@state.validKeyBody)} onClick={@_onDone}>Save</button>
<div className="private-key-popover" tabIndex=0>
<span key="title" className="picker-title"><b>No PGP private key found.<br/>Add a key for {@_renderAddresses()}</b></span>
<div className="key-add-buttons">
<button className="btn btn-toolbar paste-btn" onClick={@_onClickPaste}>Paste in a Key</button>
<button className="btn btn-toolbar import-btn" onClick={@_onClickImport}>Import from File</button>
</div>
{if (@state.import or @state.paste) and !@state.validKeyBody and @state.keyBody != "" then errorBar}
{if @state.import or @state.paste then keyArea}
<div className="picker-controls">
<div style={{width: 80}}><button className="btn modal-cancel-button" onClick={=> Actions.closePopover()}>Cancel</button></div>
pgp-plugin update (#2534) * Fix private key email-adder, add "no private key" error The decrypt UI is seriously confusing some people. This commit adds an error message that should at least stop them from trying to decrypt a message without a private key to speak of. Also, there was a dumb hardcoded true in validAddress. * Adds incorrect passphrase notification; enables carriage return for popover The passphrase popover was woefully inadequate. It didn't tell users when they had the wrong password - it just closed without saying anything - and you couldn't even use carriage return to submit the password. This commit fixes those mistakes by buffing out passphrase-popover.cjsx. * Adds private key popover to decrypt button The decrypt UI was confusing and didn't provide the user with an option to get a key imported from the message view. This mondo commit adds an entirely new popover so that the user never again will be forced to go to the preferences page. * Adds more forgiving encrypted block parsing * Overhauls decryption error handling The decrypt UI didn't clearly communicate error messages from the failure in PGPKeyStore.decrypt up to the user. This commit adds nice error surfacing as well as some pretty colors. * Fix encrypt modal key miscount error via getKeyContents coercion On Linux and Windows, fs.watch double-triggers on some actions in the key folder, for reasons that aren't super clear. This was causing issues where the encrypt modal would report not having a key loaded even though the key was totally loaded and saved. This commit sort of kludgily forces the modal to run getKeyContents for every key it has saved right before it returns them all. This would probably be better fixed with a refactor the the PGP Keystore. * remember to close popover, d'oh * patch key picker modal styling for Linux and Windows * response to review
2016-07-09 02:29:10 +08:00
<button className="btn modal-prefs-button" onClick={@_onClickAdvanced}>Advanced</button>
<div style={{width: 80}}>{saveButton}</div>
</div>
</div>
_renderAddresses: =>
signedIn = _.pluck(AccountStore.accounts(), "emailAddress")
suggestions = _.intersection(signedIn, @props.addresses)
if suggestions.length == 1
addresses = <span>{suggestions[0]}.</span>
else if suggestions.length > 1
options = suggestions.map((address) => <option value={suggestions.indexOf(address)} key={suggestions.indexOf(address)}>{address}</option>)
addresses =
<select value={@state.selectedAddress} onChange={@_onSelectAddress} style={{minWidth: 150}}>
{options}
</select>
else
throw new Error("How did you receive a message that you're not in the TO field for?")
_onSelectAddress: (event) =>
@setState
selectedAddress: parseInt(event.target.value, 10)
_displayError: (err) ->
dialog = remote.dialog
dialog.showErrorBox('Private Key Error', err.toString())
_onClickAdvanced: =>
Actions.switchPreferencesTab('Encryption')
Actions.openPreferences()
_onClickImport: (event) =>
NylasEnv.showOpenDialog({
title: "Import PGP Key",
buttonLabel: "Import",
properties: ['openFile']
}, (filepath) =>
if filepath?
fs.readFile(filepath[0], (err, data) =>
pgp.KeyManager.import_from_armored_pgp {
armored: data
}, (err, km) =>
if err
@_displayError("File is not a valid PGP private key.")
return
else
privateStart = "-----BEGIN PGP PRIVATE KEY BLOCK-----"
if km.armored_pgp_public.indexOf(privateStart) >= 0
@setState
paste: false
import: true
keyBody: km.armored_pgp_public
validKeyBody: true
else
@_displayError("File is not a valid PGP private key.")
)
)
_onClickPaste: (event) =>
@setState
paste: !@state.paste
import: false
keyBody: ""
validKeyBody: false
_onKeyChange: (event) =>
@setState
keyBody: event.target.value
pgp.KeyManager.import_from_armored_pgp {
armored: event.target.value
}, (err, km) =>
if err
valid = false
else
privateStart = "-----BEGIN PGP PRIVATE KEY BLOCK-----"
if km.armored_pgp_public.indexOf(privateStart) >= 0
valid = true
else
valid = false
@setState
validKeyBody: valid
_onDone: =>
signedIn = _.pluck(AccountStore.accounts(), "emailAddress")
suggestions = _.intersection(signedIn, @props.addresses)
selectedAddress = suggestions[@state.selectedAddress]
ident = new Identity({
addresses: [selectedAddress]
isPriv: true
})
@unlistenKeystore = PGPKeyStore.listen(@_onKeySaved, @)
PGPKeyStore.saveNewKey(ident, @state.keyBody)
_onKeySaved: =>
@unlistenKeystore()
Actions.closePopover()
@props.callback()