mirror of
https://github.com/Foundry376/Mailspring.git
synced 2025-01-14 12:08:27 +08:00
d1003fbac4
* Fix private key email-adder, add "no private key" error The decrypt UI is seriously confusing some people. This commit adds an error message that should at least stop them from trying to decrypt a message without a private key to speak of. Also, there was a dumb hardcoded true in validAddress. * Adds incorrect passphrase notification; enables carriage return for popover The passphrase popover was woefully inadequate. It didn't tell users when they had the wrong password - it just closed without saying anything - and you couldn't even use carriage return to submit the password. This commit fixes those mistakes by buffing out passphrase-popover.cjsx. * Adds private key popover to decrypt button The decrypt UI was confusing and didn't provide the user with an option to get a key imported from the message view. This mondo commit adds an entirely new popover so that the user never again will be forced to go to the preferences page. * Adds more forgiving encrypted block parsing * Overhauls decryption error handling The decrypt UI didn't clearly communicate error messages from the failure in PGPKeyStore.decrypt up to the user. This commit adds nice error surfacing as well as some pretty colors. * Fix encrypt modal key miscount error via getKeyContents coercion On Linux and Windows, fs.watch double-triggers on some actions in the key folder, for reasons that aren't super clear. This was causing issues where the encrypt modal would report not having a key loaded even though the key was totally loaded and saved. This commit sort of kludgily forces the modal to run getKeyContents for every key it has saved right before it returns them all. This would probably be better fixed with a refactor the the PGP Keystore. * remember to close popover, d'oh * patch key picker modal styling for Linux and Windows * response to review
157 lines
5.4 KiB
CoffeeScript
157 lines
5.4 KiB
CoffeeScript
{Utils, React, Actions} = require 'nylas-exports'
|
|
PGPKeyStore = require './pgp-key-store'
|
|
KeybaseSearch = require './keybase-search'
|
|
KeybaseUser = require './keybase-user'
|
|
kb = require './keybase'
|
|
_ = require 'underscore'
|
|
|
|
module.exports =
|
|
class ModalKeyRecommender extends React.Component
|
|
|
|
@displayName: 'ModalKeyRecommender'
|
|
|
|
@propTypes:
|
|
contacts: React.PropTypes.array.isRequired
|
|
emails: React.PropTypes.array
|
|
callback: React.PropTypes.function
|
|
|
|
@defaultProps:
|
|
callback: -> return # NOP
|
|
|
|
constructor: (props) ->
|
|
super(props)
|
|
@state = Object.assign({
|
|
currentContact: 0},
|
|
@_getStateFromStores())
|
|
|
|
componentDidMount: ->
|
|
@unlistenKeystore = PGPKeyStore.listen(@_onKeystoreChange)
|
|
|
|
componentWillUnmount: ->
|
|
@unlistenKeystore()
|
|
|
|
_onKeystoreChange: =>
|
|
@setState(@_getStateFromStores())
|
|
|
|
_getStateFromStores: =>
|
|
identities: PGPKeyStore.pubKeys(@props.emails)
|
|
|
|
_selectProfile: (address, identity) =>
|
|
# TODO this is an almost exact duplicate of keybase-search.cjsx:_save
|
|
keybaseUsername = identity.keybase_profile.components.username.val
|
|
identity.addresses.push(address)
|
|
kb.getKey(keybaseUsername, (error, key) =>
|
|
if error
|
|
console.error error
|
|
else
|
|
PGPKeyStore.saveNewKey(identity, key)
|
|
)
|
|
|
|
_onNext: =>
|
|
# NOTE: this doesn't do bounds checks! you must do that in render()!
|
|
@setState({currentContact: @state.currentContact + 1})
|
|
|
|
_onPrev: =>
|
|
# NOTE: this doesn't do bounds checks! you must do that in render()!
|
|
@setState({currentContact: @state.currentContact - 1})
|
|
|
|
_setPage: (page) =>
|
|
# NOTE: this doesn't do bounds checks! you must do that in render()!
|
|
@setState({currentContact: page})
|
|
# indexes from 0 because what kind of monster doesn't
|
|
|
|
_onDone: =>
|
|
if @state.identities.length < @props.emails.length
|
|
if !PGPKeyStore._displayDialog(
|
|
'Encrypt without keys for all recipients?',
|
|
'Some recipients are missing PGP public keys. They will not be able to decrypt this message.',
|
|
['Encrypt', 'Cancel']
|
|
)
|
|
return
|
|
|
|
emptyIdents = _.filter(@state.identities, (identity) -> !identity.key?)
|
|
if emptyIdents.length == 0
|
|
Actions.closePopover()
|
|
@props.callback(@state.identities)
|
|
else
|
|
newIdents = []
|
|
for idIndex of emptyIdents
|
|
identity = emptyIdents[idIndex]
|
|
if idIndex < emptyIdents.length - 1
|
|
PGPKeyStore.getKeyContents(key: identity, callback: (identity) => newIdents.push(identity))
|
|
else
|
|
PGPKeyStore.getKeyContents(key: identity, callback: (identity) =>
|
|
newIdents.push(identity)
|
|
@props.callback(newIdents)
|
|
Actions.closePopover()
|
|
)
|
|
|
|
_onManageKeys: =>
|
|
Actions.switchPreferencesTab('Encryption')
|
|
Actions.openPreferences()
|
|
|
|
render: ->
|
|
# find the email we're dealing with now
|
|
email = @props.emails[@state.currentContact]
|
|
# and a corresponding contact
|
|
contact = _.findWhere(@props.contacts, {'email': email})
|
|
contactString = if contact? then contact.toString() else email
|
|
# find the identity object that goes with this email (if any)
|
|
identity = _.find(@state.identities, (identity) ->
|
|
return email in identity.addresses
|
|
)
|
|
|
|
if @state.currentContact == (@props.emails.length - 1)
|
|
# last one
|
|
if @props.emails.length == 1
|
|
# only one
|
|
backButton = false
|
|
else
|
|
backButton = <button className="btn modal-back-button" onClick={ @_onPrev }>Back</button>
|
|
nextButton = <button className="btn modal-next-button" onClick={ @_onDone }>Done</button>
|
|
else if @state.currentContact == 0
|
|
# first one
|
|
backButton = false
|
|
nextButton = <button className="btn modal-next-button" onClick={ @_onNext }>Next</button>
|
|
else
|
|
# somewhere in the middle
|
|
backButton = <button className="btn modal-back-button" onClick={ @_onPrev }>Back</button>
|
|
nextButton = <button className="btn modal-next-button" onClick={ @_onNext }>Next</button>
|
|
|
|
if identity?
|
|
deleteButton = (<button title="Delete Public" className="btn btn-toolbar btn-danger" onClick={ => PGPKeyStore.deleteKey(identity) } ref="button">
|
|
Delete Key
|
|
</button>
|
|
)
|
|
body = [
|
|
<div key="title" className="picker-title">This PGP public key has been saved for <br/><b>{ contactString }.</b></div>
|
|
<div className="keybase-profile-solo">
|
|
<KeybaseUser key="keybase-user" profile={ identity }, displayEmailList={false}, actionButton={deleteButton}/>
|
|
</div>
|
|
]
|
|
else
|
|
if contact?
|
|
query = contact.fullName()
|
|
# don't search Keybase for emails, won't work anyways
|
|
if not query.match(/\s/)?
|
|
query = ""
|
|
else
|
|
query = ""
|
|
importFunc = ((identity) => @_selectProfile(email, identity))
|
|
|
|
body = [
|
|
<div key="title" className="picker-title">There is no PGP public key saved for <br/><b>{ contactString }.</b></div>
|
|
<KeybaseSearch key="keybase-search" initialSearch={ query }, importFunc={ importFunc } />
|
|
]
|
|
|
|
prefsButton = <button className="btn modal-prefs-button" onClick={@_onManageKeys}>Advanced Key Management</button>
|
|
|
|
<div className="key-picker-modal">
|
|
{ body }
|
|
<div style={{flex:1}}></div>
|
|
<div className="picker-controls">
|
|
<div style={{width: 60}}> { backButton } </div>
|
|
{ prefsButton }
|
|
<div style={{width: 60}}> { nextButton } </div>
|
|
</div>
|
|
</div>
|