yubioath-flutter/lib/oath/views/add_account_page.dart

570 lines
22 KiB
Dart
Raw Normal View History

2022-10-04 13:12:54 +03:00
/*
2023-05-31 11:24:41 +03:00
* Copyright (C) 2022-2023 Yubico.
2022-10-04 13:12:54 +03:00
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
2022-09-13 13:55:17 +03:00
import 'dart:async';
2022-04-14 10:08:33 +03:00
import 'dart:math';
import 'package:flutter/material.dart';
2022-09-05 16:10:44 +03:00
import 'package:flutter_gen/gen_l10n/app_localizations.dart';
import 'package:flutter_riverpod/flutter_riverpod.dart';
import 'package:logging/logging.dart';
2024-03-08 11:30:47 +03:00
import 'package:material_symbols_icons/symbols.dart';
2022-09-14 10:48:37 +03:00
import '../../android/oath/state.dart';
import '../../app/logging.dart';
2022-03-25 17:43:32 +03:00
import '../../app/message.dart';
import '../../app/models.dart';
2022-04-14 10:08:33 +03:00
import '../../app/state.dart';
2022-09-13 13:55:17 +03:00
import '../../app/views/user_interaction.dart';
2023-12-13 21:35:17 +03:00
import '../../core/models.dart';
import '../../core/state.dart';
2022-06-13 17:45:26 +03:00
import '../../desktop/models.dart';
import '../../exception/apdu_exception.dart';
import '../../exception/cancellation_exception.dart';
2022-09-13 13:55:17 +03:00
import '../../management/models.dart';
import '../../widgets/app_input_decoration.dart';
import '../../widgets/app_text_field.dart';
2022-09-01 11:14:59 +03:00
import '../../widgets/choice_filter_chip.dart';
2024-01-08 16:11:32 +03:00
import '../../widgets/file_drop_overlay.dart';
2022-03-23 12:46:35 +03:00
import '../../widgets/file_drop_target.dart';
2023-05-31 11:24:41 +03:00
import '../../widgets/focus_utils.dart';
import '../../widgets/responsive_dialog.dart';
2022-07-06 16:22:15 +03:00
import '../../widgets/utf8_utils.dart';
2022-09-12 13:58:17 +03:00
import '../keys.dart' as keys;
2022-03-15 20:04:26 +03:00
import '../models.dart';
2021-12-02 16:20:05 +03:00
import '../state.dart';
2022-09-14 14:19:39 +03:00
import 'unlock_form.dart';
import 'utils.dart';
final _log = Logger('oath.view.add_account_page');
2022-03-15 20:04:26 +03:00
class OathAddAccountPage extends ConsumerStatefulWidget {
2022-09-13 13:55:17 +03:00
final DevicePath? devicePath;
final OathState? state;
final List<OathCredential>? credentials;
final CredentialData? credentialData;
const OathAddAccountPage(
this.devicePath,
this.state, {
super.key,
required this.credentials,
this.credentialData,
});
2021-12-02 16:20:05 +03:00
@override
2022-03-15 20:04:26 +03:00
ConsumerState<ConsumerStatefulWidget> createState() =>
_OathAddAccountPageState();
2021-12-02 16:20:05 +03:00
}
2022-03-15 20:04:26 +03:00
class _OathAddAccountPageState extends ConsumerState<OathAddAccountPage> {
final _issuerController = TextEditingController();
final _accountController = TextEditingController();
final _secretController = TextEditingController();
final _periodController = TextEditingController(text: '$defaultPeriod');
2022-09-13 13:55:17 +03:00
UserInteractionController? _promptController;
Uri? _otpauthUri;
2021-12-02 16:20:05 +03:00
bool _touch = false;
OathType _oathType = defaultOathType;
HashAlgorithm _hashAlgorithm = defaultHashAlgorithm;
int _digits = defaultDigits;
int _counter = defaultCounter;
2023-11-24 16:37:37 +03:00
bool _validateSecret = false;
bool _dataLoaded = false;
bool _isObscure = true;
List<int> _periodValues = [20, 30, 45, 60];
List<int> _digitsValues = [6, 8];
List<OathCredential>? _credentials;
@override
void dispose() {
_issuerController.dispose();
_accountController.dispose();
_secretController.dispose();
_periodController.dispose();
super.dispose();
}
@override
void initState() {
super.initState();
final cred = widget.credentialData;
if (cred != null) {
_loadCredentialData(cred);
}
}
_loadCredentialData(CredentialData data) {
setState(() {
_issuerController.text = data.issuer?.trim() ?? '';
_accountController.text = data.name.trim();
_secretController.text = data.secret;
_oathType = data.oathType;
_hashAlgorithm = data.hashAlgorithm;
_periodValues = [data.period];
_periodController.text = '${data.period}';
_digitsValues = [data.digits];
_digits = data.digits;
_counter = data.counter;
_isObscure = true;
_dataLoaded = true;
});
}
2022-09-14 10:48:37 +03:00
Future<void> _doAddCredential(
{DevicePath? devicePath, required Uri credUri}) async {
2023-02-28 13:34:29 +03:00
final l10n = AppLocalizations.of(context)!;
2022-09-13 13:55:17 +03:00
try {
2023-05-31 11:24:41 +03:00
FocusUtils.unfocus(context);
2022-09-14 10:48:37 +03:00
if (devicePath == null) {
assert(isAndroid, 'devicePath is only optional for Android');
2022-09-14 10:48:37 +03:00
await ref
.read(addCredentialToAnyProvider)
.call(credUri, requireTouch: _touch);
} else {
await ref
.read(credentialListProvider(devicePath).notifier)
.addAccount(credUri, requireTouch: _touch);
}
if (!mounted) return;
Navigator.of(context).pop();
showMessage(context, l10n.s_account_added);
2022-09-13 13:55:17 +03:00
} on CancellationException catch (_) {
// ignored
} catch (e) {
_log.error('Failed to add account', e);
final String errorMessage;
// TODO: Make this cleaner than importing desktop specific RpcError.
if (e is RpcError) {
errorMessage = e.message;
2023-01-09 19:22:34 +03:00
} else if (e is ApduException) {
errorMessage = e.message;
2022-09-13 13:55:17 +03:00
} else {
errorMessage = e.toString();
}
showMessage(
context,
l10n.l_account_add_failed(errorMessage),
2022-09-13 13:55:17 +03:00
duration: const Duration(seconds: 4),
);
}
}
@override
2021-12-02 16:20:05 +03:00
Widget build(BuildContext context) {
2023-02-28 13:34:29 +03:00
final l10n = AppLocalizations.of(context)!;
2022-09-13 13:55:17 +03:00
final deviceNode = ref.watch(currentDeviceProvider);
if (widget.devicePath != null && widget.devicePath != deviceNode?.path) {
// If the dialog was started for a specific device and it was
// changed/removed, close the dialog.
Navigator.of(context).popUntil((route) => route.isFirst);
}
final OathState? oathState;
if (widget.state == null && deviceNode != null) {
oathState = ref
.watch(oathStateProvider(deviceNode.path))
.maybeWhen(data: (data) => data, orElse: () => null);
_credentials = ref
.watch(credentialListProvider(deviceNode.path))
?.map((e) => e.credential)
.toList();
2022-09-13 13:55:17 +03:00
} else {
oathState = widget.state;
_credentials = widget.credentials;
2022-09-13 13:55:17 +03:00
}
final otpauthUri = _otpauthUri;
2023-02-28 17:02:12 +03:00
_promptController?.updateContent(title: l10n.l_insert_yk);
2022-09-13 13:55:17 +03:00
if (otpauthUri != null && deviceNode != null) {
final deviceData = ref.watch(currentDeviceDataProvider);
deviceData.when(data: (data) {
if (Capability.oath.value ^
(data.info.config.enabledCapabilities[deviceNode.transport] ??
0) !=
0) {
if (oathState == null) {
_promptController?.updateContent(title: l10n.s_please_wait);
2022-09-13 13:55:17 +03:00
} else if (oathState.locked) {
2022-09-14 16:54:51 +03:00
_promptController?.close();
2022-09-13 13:55:17 +03:00
} else {
_otpauthUri = null;
_promptController?.close();
2022-09-14 10:48:37 +03:00
Timer.run(() => _doAddCredential(
2022-09-14 16:54:51 +03:00
devicePath: deviceNode.path,
credUri: otpauthUri,
));
2022-09-13 13:55:17 +03:00
}
} else {
_promptController?.updateContent(title: l10n.s_unsupported_yk);
2022-09-13 13:55:17 +03:00
}
}, error: (error, _) {
_promptController?.updateContent(title: l10n.s_unsupported_yk);
2022-09-13 13:55:17 +03:00
}, loading: () {
_promptController?.updateContent(title: l10n.s_please_wait);
2022-09-13 13:55:17 +03:00
});
}
final period = int.tryParse(_periodController.text) ?? -1;
final issuerText = _issuerController.text.trim();
final nameText = _accountController.text.trim();
2023-05-22 12:20:30 +03:00
final (issuerRemaining, nameRemaining) = getRemainingKeySpace(
oathType: _oathType,
period: period,
issuer: issuerText,
name: nameText,
);
final issuerMaxLength = max(issuerRemaining, 1);
final nameMaxLength = max(nameRemaining, 1);
final secret = _secretController.text.replaceAll(' ', '');
final secretLengthValid = secret.length * 5 % 8 < 5;
2023-11-24 16:37:37 +03:00
final secretFormatValid = Format.base32.isValid(secret);
// is this credentials name/issuer pair different from all other?
final isUnique = _credentials
?.where((element) =>
element.name == nameText &&
(element.issuer ?? '') == issuerText)
.isEmpty ??
true;
2022-10-21 11:31:40 +03:00
final issuerNoColon = !_issuerController.text.contains(':');
2022-09-14 14:19:39 +03:00
final isLocked = oathState?.locked ?? false;
final isValid = !isLocked &&
nameText.isNotEmpty &&
secret.isNotEmpty &&
isUnique &&
2022-10-21 11:31:40 +03:00
issuerNoColon &&
issuerRemaining >= -1 &&
nameRemaining >= 0 &&
period > 0;
2022-09-14 14:19:39 +03:00
final hashAlgorithms = HashAlgorithm.values
.where((alg) =>
alg != HashAlgorithm.sha512 ||
(oathState?.version.isAtLeast(4, 3, 1) ?? true))
.toList();
2022-09-13 13:55:17 +03:00
if (!hashAlgorithms.contains(_hashAlgorithm)) {
_hashAlgorithm = HashAlgorithm.sha1;
}
2022-09-14 14:19:39 +03:00
if (!(oathState?.version.isAtLeast(4, 2) ?? true)) {
// Touch not supported
_touch = false;
}
void submit() async {
2023-11-24 16:37:37 +03:00
if (secretLengthValid && secretFormatValid) {
final cred = CredentialData(
issuer: issuerText.isEmpty ? null : issuerText,
name: nameText,
secret: secret,
oathType: _oathType,
hashAlgorithm: _hashAlgorithm,
digits: _digits,
period: period,
counter: _counter,
);
2022-09-13 13:55:17 +03:00
final devicePath = deviceNode?.path;
if (devicePath != null) {
2022-09-14 10:48:37 +03:00
await _doAddCredential(devicePath: devicePath, credUri: cred.toUri());
} else if (isAndroid) {
2022-09-14 10:48:37 +03:00
// Send the credential to Android to be added to the next YubiKey
await _doAddCredential(devicePath: null, credUri: cred.toUri());
2022-09-13 13:55:17 +03:00
} else {
2022-09-14 10:48:37 +03:00
// Desktop. No YubiKey, prompt and store the cred.
2022-09-13 13:55:17 +03:00
_otpauthUri = cred.toUri();
_promptController = promptUserInteraction(
2022-06-13 17:45:26 +03:00
context,
2023-02-28 17:02:12 +03:00
title: l10n.l_insert_yk,
description: l10n.s_add_account,
2024-03-08 11:30:47 +03:00
icon: const Icon(Symbols.usb),
2022-09-13 13:55:17 +03:00
onCancel: () {
_otpauthUri = null;
},
2022-06-13 17:45:26 +03:00
);
}
} else {
setState(() {
2023-11-24 16:37:37 +03:00
_validateSecret = true;
});
}
}
return FileDropTarget(
2024-01-10 18:06:12 +03:00
onFileDropped: (file) async {
final qrScanner = ref.read(qrScannerProvider);
final withContext = ref.read(withContextProvider);
if (qrScanner != null) {
final qrData =
await handleQrFile(file, context, withContext, qrScanner);
if (qrData != null) {
await withContext((context) async {
List<CredentialData> creds;
try {
creds = CredentialData.fromUri(Uri.parse(qrData));
} catch (_) {
showMessage(context, l10n.l_invalid_qr);
return;
}
if (creds.length == 1) {
_loadCredentialData(creds[0]);
} else {
Navigator.of(context).pop();
await handleUri(context, widget.credentials, qrData,
widget.devicePath, widget.state, l10n);
}
});
}
}
},
2024-01-08 16:11:32 +03:00
overlay: FileDropOverlay(
title: l10n.s_add_account,
subtitle: l10n.l_drop_qr_description,
2024-01-08 16:11:32 +03:00
),
child: ResponsiveDialog(
title: Text(l10n.s_add_account),
actions: [
TextButton(
onPressed: isValid ? submit : null,
child: Text(l10n.s_save, key: keys.saveButton),
),
],
2022-09-14 16:54:51 +03:00
child: isLocked
? Padding(
padding: const EdgeInsets.symmetric(vertical: 18),
child:
UnlockForm(deviceNode!.path, keystore: oathState!.keystore),
)
: Padding(
padding: const EdgeInsets.symmetric(horizontal: 18.0),
child: Column(
2022-09-14 14:19:39 +03:00
crossAxisAlignment: CrossAxisAlignment.start,
children: [
2023-11-10 17:24:53 +03:00
AppTextField(
2022-09-14 14:19:39 +03:00
key: keys.issuerField,
controller: _issuerController,
autofocus: widget.credentialData == null,
2022-09-14 14:19:39 +03:00
enabled: issuerRemaining > 0,
maxLength: issuerMaxLength,
2022-10-21 11:31:40 +03:00
inputFormatters: [
limitBytesLength(issuerRemaining),
],
buildCounter: buildByteCounterFor(issuerText),
2023-12-14 18:38:10 +03:00
decoration: AppInputDecoration(
2022-09-14 14:19:39 +03:00
border: const OutlineInputBorder(),
labelText: l10n.s_issuer_optional,
2023-11-24 16:37:37 +03:00
helperText:
'', // Prevents dialog resizing when disabled
errorText: (byteLength(issuerText) > issuerMaxLength)
? '' // needs empty string to render as error
: issuerNoColon
? null
2023-02-28 17:02:12 +03:00
: l10n.l_invalid_character_issuer,
2024-03-08 11:30:47 +03:00
prefixIcon: const Icon(Symbols.business),
),
2022-09-14 14:19:39 +03:00
textInputAction: TextInputAction.next,
onChanged: (value) {
setState(() {
2022-09-14 14:19:39 +03:00
// Update maxlengths
});
},
2022-09-14 14:19:39 +03:00
onSubmitted: (_) {
if (isValid) submit();
},
).init(),
2023-11-10 17:24:53 +03:00
AppTextField(
2022-09-14 14:19:39 +03:00
key: keys.nameField,
controller: _accountController,
maxLength: nameMaxLength,
buildCounter: buildByteCounterFor(nameText),
2022-09-14 14:19:39 +03:00
inputFormatters: [limitBytesLength(nameRemaining)],
2023-12-14 18:38:10 +03:00
decoration: AppInputDecoration(
2022-09-14 14:19:39 +03:00
border: const OutlineInputBorder(),
labelText: l10n.s_account_name,
helperText: '',
// Prevents dialog resizing when disabled
errorText: (byteLength(nameText) > nameMaxLength)
? '' // needs empty string to render as error
: isUnique
? null
2023-03-02 11:34:01 +03:00
: l10n.l_name_already_exists,
2024-03-08 16:05:06 +03:00
prefixIcon: const Icon(Symbols.person),
2022-09-14 14:19:39 +03:00
),
textInputAction: TextInputAction.next,
onChanged: (value) {
setState(() {
// Update maxlengths
});
},
onSubmitted: (_) {
if (isValid) submit();
},
).init(),
2023-11-10 17:24:53 +03:00
AppTextField(
2022-09-14 14:19:39 +03:00
key: keys.secretField,
controller: _secretController,
obscureText: _isObscure,
// avoid using autofill hints on Android otherwise Autofill service
// would hint to use saved passwords for this field
2023-05-22 12:20:30 +03:00
autofillHints:
isAndroid ? [] : const [AutofillHints.password],
2023-12-14 18:38:10 +03:00
decoration: AppInputDecoration(
border: const OutlineInputBorder(),
labelText: l10n.s_secret_key,
errorText: _validateSecret && !secretLengthValid
? l10n.s_invalid_length
: _validateSecret && !secretFormatValid
? l10n.l_invalid_format_allowed_chars(
Format.base32.allowedCharacters)
: null,
2024-03-08 11:30:47 +03:00
prefixIcon: const Icon(Symbols.key),
2023-12-14 18:38:10 +03:00
suffixIcon: IconButton(
2023-12-21 14:21:15 +03:00
icon: Icon(_isObscure
2024-03-08 11:30:47 +03:00
? Symbols.visibility
: Symbols.visibility_off),
2023-12-14 18:38:10 +03:00
onPressed: () {
setState(() {
_isObscure = !_isObscure;
});
},
tooltip: _isObscure
? l10n.s_show_secret_key
: l10n.s_hide_secret_key,
)),
readOnly: _dataLoaded,
2022-09-14 14:19:39 +03:00
textInputAction: TextInputAction.done,
onChanged: (value) {
setState(() {
2023-11-24 16:37:37 +03:00
_validateSecret = false;
});
},
2022-09-14 14:19:39 +03:00
onSubmitted: (_) {
if (isValid) submit();
},
).init(),
2023-08-18 11:44:08 +03:00
const SizedBox(height: 8),
2022-09-14 14:19:39 +03:00
Wrap(
crossAxisAlignment: WrapCrossAlignment.center,
spacing: 4.0,
runSpacing: 8.0,
children: [
if (oathState?.version.isAtLeast(4, 2) ?? true)
FilterChip(
key: keys.requireTouchFilterChip,
2023-12-20 17:09:31 +03:00
backgroundColor:
Theme.of(context).colorScheme.surfaceVariant,
label: Text(l10n.s_require_touch),
2022-09-14 14:19:39 +03:00
selected: _touch,
onSelected: (value) {
setState(() {
2022-09-14 14:19:39 +03:00
_touch = value;
});
2022-09-14 14:19:39 +03:00
},
),
ChoiceFilterChip<OathType>(
key: keys.oathTypeFilterChip,
2022-09-14 14:19:39 +03:00
items: OathType.values,
value: _oathType,
selected: _oathType != defaultOathType,
itemBuilder: (value) => Text(
value.getDisplayName(l10n),
key: value == OathType.totp
? keys.oathTypeTotpFilterValue
: keys.oathTypeHotpFilterValue),
onChanged: !_dataLoaded
2022-09-14 14:19:39 +03:00
? (value) {
setState(() {
_oathType = value;
});
}
: null,
),
ChoiceFilterChip<HashAlgorithm>(
key: keys.hashAlgorithmFilterChip,
2022-09-14 14:19:39 +03:00
items: hashAlgorithms,
value: _hashAlgorithm,
selected: _hashAlgorithm != defaultHashAlgorithm,
itemBuilder: (value) => Text(value.displayName,
key: value == HashAlgorithm.sha1
? keys.hashAlgorithmSha1FilterValue
: value == HashAlgorithm.sha256
? keys.hashAlgorithmSha256FilterValue
: keys.hashAlgorithmSha512FilterValue),
onChanged: !_dataLoaded
2022-09-14 14:19:39 +03:00
? (value) {
setState(() {
_hashAlgorithm = value;
});
}
: null,
),
if (_oathType == OathType.totp)
ChoiceFilterChip<int>(
key: keys.periodFilterChip,
2022-09-14 14:19:39 +03:00
items: _periodValues,
value: int.tryParse(_periodController.text) ??
defaultPeriod,
selected: int.tryParse(_periodController.text) !=
defaultPeriod,
2023-02-28 13:34:29 +03:00
itemBuilder: ((value) =>
Text(l10n.s_num_sec(value))),
onChanged: !_dataLoaded
2022-09-14 14:19:39 +03:00
? (period) {
setState(() {
_periodController.text = '$period';
});
}
: null,
),
ChoiceFilterChip<int>(
key: keys.digitsFilterChip,
2022-09-14 14:19:39 +03:00
items: _digitsValues,
value: _digits,
selected: _digits != defaultDigits,
2023-02-28 13:34:29 +03:00
itemBuilder: (value) =>
Text(l10n.s_num_digits(value)),
// TODO: need to figure out how to add values for
// digits6FilterValue
// digits8FilterValue
onChanged: !_dataLoaded
2022-09-14 14:19:39 +03:00
? (digits) {
setState(() {
_digits = digits;
});
}
: null,
),
],
),
2022-09-14 14:19:39 +03:00
]
.map((e) => Padding(
padding: const EdgeInsets.symmetric(vertical: 8.0),
child: e,
))
.toList(),
),
2022-09-14 16:54:51 +03:00
),
2022-03-23 12:46:35 +03:00
),
);
}
}