mirror of
https://github.com/vector-im/element-web.git
synced 2025-11-11 13:41:09 +01:00
* Add `?no_universal_links=true` to OIDC cb url so EX doesn't try to handle it This is specific to macOS and only affects cases where auth is attempted in the non-default browser Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Strip no_universal_links after auth Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Update MAS Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Update playwright-common Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Iterate Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Iterate Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Bump @element-hq/element-web-playwright-common Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> * Tests Signed-off-by: Michael Telatynski <7t3chguy@gmail.com> --------- Signed-off-by: Michael Telatynski <7t3chguy@gmail.com>
222 lines
9.6 KiB
TypeScript
222 lines
9.6 KiB
TypeScript
/*
|
|
Copyright 2024 New Vector Ltd.
|
|
Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
Copyright 2019 Michael Telatynski <7t3chguy@gmail.com>
|
|
Copyright 2018, 2019 New Vector Ltd
|
|
Copyright 2017 Vector Creations Ltd
|
|
Copyright 2015, 2016 OpenMarket Ltd
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only OR GPL-3.0-only OR LicenseRef-Element-Commercial
|
|
Please see LICENSE files in the repository root for full details.
|
|
*/
|
|
|
|
// To ensure we load the browser-matrix version first
|
|
import "matrix-js-sdk/src/browser-index";
|
|
import React, { type ReactElement, StrictMode } from "react";
|
|
import { logger } from "matrix-js-sdk/src/logger";
|
|
import { createClient, AutoDiscovery, type ClientConfig } from "matrix-js-sdk/src/matrix";
|
|
import { WrapperLifecycle, type WrapperOpts } from "@matrix-org/react-sdk-module-api/lib/lifecycles/WrapperLifecycle";
|
|
|
|
import type { QueryDict } from "matrix-js-sdk/src/utils";
|
|
import PlatformPeg from "../PlatformPeg";
|
|
import AutoDiscoveryUtils from "../utils/AutoDiscoveryUtils";
|
|
import * as Lifecycle from "../Lifecycle";
|
|
import SdkConfig, { parseSsoRedirectOptions } from "../SdkConfig";
|
|
import { type IConfigOptions } from "../IConfigOptions";
|
|
import { SnakedObject } from "../utils/SnakedObject";
|
|
import MatrixChat from "../components/structures/MatrixChat";
|
|
import { type ValidatedServerConfig } from "../utils/ValidatedServerConfig";
|
|
import { ModuleRunner } from "../modules/ModuleRunner";
|
|
import { parseQs } from "./url_utils";
|
|
import { getInitialScreenAfterLogin, getScreenFromLocation, init as initRouting, onNewScreen } from "./routing";
|
|
import { UserFriendlyError } from "../languageHandler";
|
|
|
|
logger.log(`Application is running in ${process.env.NODE_ENV} mode`);
|
|
|
|
window.matrixLogger = logger;
|
|
|
|
function onTokenLoginCompleted(): void {
|
|
// if we did a token login, we're now left with the token, hs and is
|
|
// url as query params in the url;
|
|
// if we did an oidc authorization code flow login, we're left with the auth code and state
|
|
// as query params in the url;
|
|
// a little nasty but let's redirect to clear them.
|
|
const url = new URL(window.location.href);
|
|
|
|
url.searchParams.delete("no_universal_links");
|
|
url.searchParams.delete("loginToken");
|
|
url.searchParams.delete("state");
|
|
url.searchParams.delete("code");
|
|
|
|
logger.log(`Redirecting to ${url.href} to drop delegated authentication params from queryparams`);
|
|
window.history.replaceState(null, "", url.href);
|
|
}
|
|
|
|
export async function loadApp(fragParams: QueryDict, matrixChatRef: React.Ref<MatrixChat>): Promise<ReactElement> {
|
|
initRouting();
|
|
const platform = PlatformPeg.get();
|
|
|
|
const params = parseQs(window.location);
|
|
|
|
const urlWithoutQuery = window.location.protocol + "//" + window.location.host + window.location.pathname;
|
|
logger.log("Vector starting at " + urlWithoutQuery);
|
|
|
|
platform?.startUpdater();
|
|
|
|
// Don't bother loading the app until the config is verified
|
|
const config = await verifyServerConfig();
|
|
const snakedConfig = new SnakedObject<IConfigOptions>(config);
|
|
|
|
// Before we continue, let's see if we're supposed to do an SSO redirect
|
|
const [userId] = await Lifecycle.getStoredSessionOwner();
|
|
const hasPossibleToken = !!userId;
|
|
const isReturningFromSso = !!params.loginToken;
|
|
const ssoRedirects = parseSsoRedirectOptions(config);
|
|
let autoRedirect = ssoRedirects.immediate === true;
|
|
// XXX: This path matching is a bit brittle, but better to do it early instead of in the app code.
|
|
const isWelcomeOrLanding =
|
|
window.location.hash === "#/welcome" || window.location.hash === "#" || window.location.hash === "";
|
|
const isLoginPage = window.location.hash === "#/login";
|
|
|
|
if (!autoRedirect && ssoRedirects.on_welcome_page && isWelcomeOrLanding) {
|
|
autoRedirect = true;
|
|
}
|
|
if (!autoRedirect && ssoRedirects.on_login_page && isLoginPage) {
|
|
autoRedirect = true;
|
|
}
|
|
if (!hasPossibleToken && !isReturningFromSso && autoRedirect) {
|
|
logger.log("Bypassing app load to redirect to SSO");
|
|
const tempCli = createClient({
|
|
baseUrl: config.validated_server_config!.hsUrl,
|
|
idBaseUrl: config.validated_server_config!.isUrl,
|
|
});
|
|
PlatformPeg.get()!.startSingleSignOn(tempCli, "sso", `/${getScreenFromLocation(window.location).screen}`);
|
|
|
|
// We return here because startSingleSignOn() will asynchronously redirect us. We don't
|
|
// care to wait for it, and don't want to show any UI while we wait (not even half a welcome
|
|
// page). As such, just don't even bother loading the MatrixChat component.
|
|
return <React.Fragment />;
|
|
}
|
|
|
|
const defaultDeviceName =
|
|
snakedConfig.get("default_device_display_name") ?? platform?.getDefaultDeviceDisplayName();
|
|
|
|
const initialScreenAfterLogin = getInitialScreenAfterLogin(window.location);
|
|
|
|
const wrapperOpts: WrapperOpts = { Wrapper: React.Fragment };
|
|
ModuleRunner.instance.invoke(WrapperLifecycle.Wrapper, wrapperOpts);
|
|
|
|
return (
|
|
<wrapperOpts.Wrapper>
|
|
<StrictMode>
|
|
<MatrixChat
|
|
ref={matrixChatRef}
|
|
onNewScreen={onNewScreen}
|
|
config={config}
|
|
realQueryParams={params}
|
|
startingFragmentQueryParams={fragParams}
|
|
enableGuest={!config.disable_guests}
|
|
onTokenLoginCompleted={onTokenLoginCompleted}
|
|
initialScreenAfterLogin={initialScreenAfterLogin}
|
|
defaultDeviceDisplayName={defaultDeviceName}
|
|
/>
|
|
</StrictMode>
|
|
</wrapperOpts.Wrapper>
|
|
);
|
|
}
|
|
|
|
async function verifyServerConfig(): Promise<IConfigOptions> {
|
|
let validatedConfig: ValidatedServerConfig;
|
|
try {
|
|
logger.log("Verifying homeserver configuration");
|
|
|
|
// Note: the query string may include is_url and hs_url - we only respect these in the
|
|
// context of email validation. Because we don't respect them otherwise, we do not need
|
|
// to parse or consider them here.
|
|
|
|
// Note: Although we throw all 3 possible configuration options through a .well-known-style
|
|
// verification, we do not care if the servers are online at this point. We do moderately
|
|
// care if they are syntactically correct though, so we shove them through the .well-known
|
|
// validators for that purpose.
|
|
|
|
const config = SdkConfig.get();
|
|
let wkConfig = config["default_server_config"]; // overwritten later under some conditions
|
|
const serverName = config["default_server_name"];
|
|
const hsUrl = config["default_hs_url"];
|
|
const isUrl = config["default_is_url"];
|
|
|
|
const incompatibleOptions = [wkConfig, serverName, hsUrl].filter((i) => !!i);
|
|
if (hsUrl && (wkConfig || serverName)) {
|
|
// noinspection ExceptionCaughtLocallyJS
|
|
throw new UserFriendlyError("error|invalid_configuration_mixed_server");
|
|
}
|
|
if (incompatibleOptions.length < 1) {
|
|
// noinspection ExceptionCaughtLocallyJS
|
|
throw new UserFriendlyError("error|invalid_configuration_no_server");
|
|
}
|
|
|
|
if (hsUrl) {
|
|
logger.log("Config uses a default_hs_url - constructing a default_server_config using this information");
|
|
logger.warn(
|
|
"DEPRECATED CONFIG OPTION: In the future, default_hs_url will not be accepted. Please use " +
|
|
"default_server_config instead.",
|
|
);
|
|
|
|
wkConfig = {
|
|
"m.homeserver": {
|
|
base_url: hsUrl,
|
|
},
|
|
};
|
|
if (isUrl) {
|
|
wkConfig["m.identity_server"] = {
|
|
base_url: isUrl,
|
|
};
|
|
}
|
|
}
|
|
|
|
let discoveryResult: ClientConfig | undefined;
|
|
if (!serverName && wkConfig) {
|
|
logger.log("Config uses a default_server_config - validating object");
|
|
discoveryResult = await AutoDiscovery.fromDiscoveryConfig(wkConfig);
|
|
}
|
|
|
|
if (serverName) {
|
|
logger.log("Config uses a default_server_name - doing .well-known lookup");
|
|
logger.warn(
|
|
"DEPRECATED CONFIG OPTION: In the future, default_server_name will not be accepted. Please " +
|
|
"use default_server_config instead.",
|
|
);
|
|
discoveryResult = await AutoDiscovery.findClientConfig(serverName);
|
|
if (discoveryResult["m.homeserver"].base_url === null && wkConfig) {
|
|
logger.log("Finding base_url failed but a default_server_config was found - using it as a fallback");
|
|
discoveryResult = await AutoDiscovery.fromDiscoveryConfig(wkConfig);
|
|
}
|
|
}
|
|
|
|
validatedConfig = await AutoDiscoveryUtils.buildValidatedConfigFromDiscovery(serverName, discoveryResult, true);
|
|
} catch (e) {
|
|
const { hsUrl, isUrl, userId } = await Lifecycle.getStoredSessionVars();
|
|
if (hsUrl && userId) {
|
|
logger.error(e);
|
|
logger.warn("A session was found - suppressing config error and using the session's homeserver");
|
|
|
|
logger.log("Using pre-existing hsUrl and isUrl: ", { hsUrl, isUrl });
|
|
validatedConfig = await AutoDiscoveryUtils.validateServerConfigWithStaticUrls(hsUrl, isUrl, true);
|
|
} else {
|
|
// the user is not logged in, so scream
|
|
throw e;
|
|
}
|
|
}
|
|
|
|
validatedConfig.isDefault = true;
|
|
|
|
// Just in case we ever have to debug this
|
|
logger.log("Using homeserver config:", validatedConfig);
|
|
|
|
// Add the newly built config to the actual config for use by the app
|
|
logger.log("Updating SdkConfig with validated discovery information");
|
|
SdkConfig.add({ validated_server_config: validatedConfig });
|
|
|
|
return SdkConfig.get();
|
|
}
|