Merge branch 'staging' into get_contacts
This commit is contained in:
@@ -127,6 +127,18 @@ define([
|
||||
return input;
|
||||
};
|
||||
|
||||
dialog.selectableArea = function (value, opt) {
|
||||
var attrs = merge({
|
||||
readonly: 'readonly',
|
||||
}, opt);
|
||||
|
||||
var input = h('textarea', attrs);
|
||||
$(input).val(value).click(function () {
|
||||
input.select();
|
||||
});
|
||||
return input;
|
||||
};
|
||||
|
||||
dialog.okButton = function (content, classString) {
|
||||
var sel = typeof(classString) === 'string'? 'button.ok.' + classString:'button.ok.primary';
|
||||
return h(sel, { tabindex: '2', }, content || Messages.okButton);
|
||||
|
||||
@@ -147,6 +147,7 @@ define([
|
||||
: Messages.owner_removeText;
|
||||
var removeCol = UIElements.getUserGrid(msg, {
|
||||
common: common,
|
||||
large: true,
|
||||
data: _owners,
|
||||
noFilter: true
|
||||
}, function () {
|
||||
@@ -238,6 +239,7 @@ define([
|
||||
});
|
||||
var addCol = UIElements.getUserGrid(Messages.owner_addText, {
|
||||
common: common,
|
||||
large: true,
|
||||
data: _friends
|
||||
}, function () {
|
||||
//console.log(arguments);
|
||||
@@ -254,6 +256,7 @@ define([
|
||||
});
|
||||
var teamsList = UIElements.getUserGrid(Messages.owner_addTeamText, {
|
||||
common: common,
|
||||
large: true,
|
||||
noFilter: true,
|
||||
data: teamsData
|
||||
}, function () {});
|
||||
@@ -551,9 +554,10 @@ define([
|
||||
$d.append(password);
|
||||
}
|
||||
|
||||
if (!data.noEditPassword && owned && parsed.type !== "sheet") { // FIXME SHEET fix password change for sheets
|
||||
if (!data.noEditPassword && owned) { // FIXME SHEET fix password change for sheets
|
||||
var sframeChan = common.getSframeChannel();
|
||||
|
||||
var isOO = parsed.type === 'sheet';
|
||||
var isFile = parsed.hashData.type === 'file';
|
||||
var isSharedFolder = parsed.type === 'drive';
|
||||
|
||||
@@ -586,7 +590,8 @@ define([
|
||||
UI.confirm(changePwConfirm, function (yes) {
|
||||
if (!yes) { pLocked = false; return; }
|
||||
$(passwordOk).html('').append(h('span.fa.fa-spinner.fa-spin', {style: 'margin-left: 0'}));
|
||||
var q = isFile ? 'Q_BLOB_PASSWORD_CHANGE' : 'Q_PAD_PASSWORD_CHANGE';
|
||||
var q = isFile ? 'Q_BLOB_PASSWORD_CHANGE' :
|
||||
(isOO ? 'Q_OO_PASSWORD_CHANGE' : 'Q_PAD_PASSWORD_CHANGE');
|
||||
|
||||
// If this is a file password change, register to the upload events:
|
||||
// * if there is a pending upload, ask if we shoudl interrupt
|
||||
@@ -737,12 +742,22 @@ define([
|
||||
UIElements.getProperties = function (common, data, cb) {
|
||||
var c1;
|
||||
var c2;
|
||||
var button = [{
|
||||
className: 'primary',
|
||||
name: Messages.okButton,
|
||||
onClick: function () {},
|
||||
keys: [13]
|
||||
}];
|
||||
NThen(function (waitFor) {
|
||||
getPadProperties(common, data, waitFor(function (e, c) {
|
||||
c1 = c[0];
|
||||
c1 = UI.dialog.customModal(c[0], {
|
||||
buttons: button
|
||||
});
|
||||
}));
|
||||
getRightsProperties(common, data, waitFor(function (e, c) {
|
||||
c2 = c[0];
|
||||
c2 = UI.dialog.customModal(c[0], {
|
||||
buttons: button
|
||||
});
|
||||
}));
|
||||
}).nThen(function () {
|
||||
var tabs = UI.dialog.tabs([{
|
||||
@@ -782,8 +797,6 @@ define([
|
||||
|
||||
var noOthers = icons.length === 0 ? '.cp-usergrid-empty' : '';
|
||||
|
||||
var buttonSelect = h('button', Messages.share_selectAll);
|
||||
var buttonDeselect = h('button', Messages.share_deselectAll);
|
||||
var inputFilter = h('input', {
|
||||
placeholder: Messages.share_filterFriend
|
||||
});
|
||||
@@ -791,9 +804,7 @@ define([
|
||||
var div = h('div.cp-usergrid-container' + noOthers + (config.large?'.large':''), [
|
||||
label ? h('label', label) : undefined,
|
||||
h('div.cp-usergrid-filter', (config.noFilter || config.noSelect) ? undefined : [
|
||||
inputFilter,
|
||||
buttonSelect,
|
||||
buttonDeselect
|
||||
inputFilter
|
||||
]),
|
||||
]);
|
||||
var $div = $(div);
|
||||
@@ -806,23 +817,8 @@ define([
|
||||
$div.find('.cp-usergrid-user:not(.cp-selected):not([data-name*="'+name+'"])').hide();
|
||||
}
|
||||
};
|
||||
|
||||
$(inputFilter).on('keydown keyup change', redraw);
|
||||
|
||||
$(buttonSelect).click(function () {
|
||||
$div.find('.cp-usergrid-user:not(.cp-selected):visible').addClass('cp-selected');
|
||||
onSelect();
|
||||
});
|
||||
$(buttonDeselect).click(function () {
|
||||
$div.find('.cp-usergrid-user.cp-selected').removeClass('cp-selected').each(function (i, el) {
|
||||
var order = $(el).attr('data-order');
|
||||
if (!order) { return; }
|
||||
$(el).attr('style', 'order:'+order);
|
||||
});
|
||||
redraw();
|
||||
onSelect();
|
||||
});
|
||||
|
||||
$(div).append(h('div.cp-usergrid-grid', icons));
|
||||
if (!config.noSelect) {
|
||||
$div.on('click', '.cp-usergrid-user', function () {
|
||||
@@ -883,7 +879,8 @@ define([
|
||||
var friendsList = UIElements.getUserGrid(null, {
|
||||
common: common,
|
||||
data: friends,
|
||||
noFilter: false
|
||||
noFilter: false,
|
||||
large: true
|
||||
}, refreshButtons);
|
||||
var friendDiv = friendsList.div;
|
||||
$div.append(friendDiv);
|
||||
@@ -909,6 +906,7 @@ define([
|
||||
var teamsList = UIElements.getUserGrid(Messages.share_linkTeam, {
|
||||
common: common,
|
||||
noFilter: true,
|
||||
large: true,
|
||||
data: teams
|
||||
}, refreshButtons);
|
||||
$div.append(teamsList.div);
|
||||
@@ -1057,12 +1055,29 @@ define([
|
||||
|
||||
if (!hashes || (!hashes.editHash && !hashes.viewHash)) { return; }
|
||||
|
||||
// check if the pad is password protected
|
||||
var hash = hashes.editHash || hashes.viewHash;
|
||||
var href = origin + pathname + '#' + hash;
|
||||
var parsedHref = Hash.parsePadUrl(href);
|
||||
var hasPassword = parsedHref.hashData.password;
|
||||
|
||||
var makeFaqLink = function () {
|
||||
var link = h('span', [
|
||||
h('i.fa.fa-question-circle'),
|
||||
h('a', {href: '#'}, Messages.passwordFaqLink)
|
||||
]);
|
||||
$(link).click(function () {
|
||||
common.openURL(config.origin + "/faq.html#security-pad_password");
|
||||
});
|
||||
return link;
|
||||
};
|
||||
|
||||
|
||||
var parsed = Hash.parsePadUrl(pathname);
|
||||
var canPresent = ['code', 'slide'].indexOf(parsed.type) !== -1;
|
||||
|
||||
var rights = h('div.msg.cp-inline-radio-group', [
|
||||
h('label', Messages.share_linkAccess),
|
||||
h('br'),
|
||||
h('div.radio-group',[
|
||||
UI.createRadio('accessRights', 'cp-share-editable-false',
|
||||
Messages.share_linkView, true, { mark: {tabindex:1} }),
|
||||
@@ -1109,9 +1124,42 @@ define([
|
||||
h('br'),
|
||||
] : [
|
||||
UI.createCheckbox('cp-share-embed', Messages.share_linkEmbed, false, { mark: {tabindex:1} }),
|
||||
h('br'),
|
||||
];
|
||||
linkContent.push(UI.dialog.selectable('', { id: 'cp-share-link-preview', tabindex: 1 }));
|
||||
linkContent.push(h('div.cp-spacer'));
|
||||
linkContent.push(UI.dialog.selectableArea('', { id: 'cp-share-link-preview', tabindex: 1, rows:3}));
|
||||
|
||||
// Show alert if the pad is password protected
|
||||
if (hasPassword) {
|
||||
linkContent.push(h('div.alert.alert-primary', [
|
||||
h('i.fa.fa-lock'),
|
||||
Messages.share_linkPasswordAlert, h('br'),
|
||||
makeFaqLink()
|
||||
]));
|
||||
}
|
||||
|
||||
// warning about sharing links
|
||||
var localStore = window.cryptpadStore;
|
||||
var dismissButton = h('span.fa.fa-times');
|
||||
var shareLinkWarning = h('div.alert.alert-warning.dismissable',
|
||||
{ style: 'display: none;' },
|
||||
[
|
||||
h('span.cp-inline-alert-text', Messages.share_linkWarning),
|
||||
dismissButton
|
||||
]);
|
||||
linkContent.push(shareLinkWarning);
|
||||
|
||||
localStore.get('hide-alert-shareLinkWarning', function (val) {
|
||||
if (val === '1') { return; }
|
||||
$(shareLinkWarning).show();
|
||||
|
||||
$(dismissButton).on('click', function () {
|
||||
localStore.put('hide-alert-shareLinkWarning', '1');
|
||||
$(shareLinkWarning).remove();
|
||||
});
|
||||
|
||||
});
|
||||
|
||||
|
||||
|
||||
var link = h('div.cp-share-modal', linkContent);
|
||||
var $link = $(link);
|
||||
@@ -1177,7 +1225,19 @@ define([
|
||||
|
||||
// XXX Don't display access rights if no contacts
|
||||
var contactsContent = h('div.cp-share-modal');
|
||||
$(contactsContent).append(friendsList);
|
||||
var $contactsContent = $(contactsContent);
|
||||
|
||||
$contactsContent.append(friendsList);
|
||||
|
||||
// Show alert if the pad is password protected
|
||||
if (hasPassword) {
|
||||
$contactsContent.append(h('div.alert.alert-primary', [
|
||||
h('i.fa.fa-unlock'),
|
||||
Messages.share_contactPasswordAlert, h('br'),
|
||||
makeFaqLink()
|
||||
]));
|
||||
}
|
||||
|
||||
|
||||
var contactButtons = friendsObject.buttons;
|
||||
contactButtons.unshift(makeCancelButton());
|
||||
@@ -1196,9 +1256,18 @@ define([
|
||||
};
|
||||
var embedContent = [
|
||||
h('p', Messages.viewEmbedTag),
|
||||
h('br'),
|
||||
UI.dialog.selectable(getEmbedValue(), { id: 'cp-embed-link-preview', tabindex: 1 })
|
||||
UI.dialog.selectableArea(getEmbedValue(), { id: 'cp-embed-link-preview', tabindex: 1, rows: 3})
|
||||
];
|
||||
|
||||
// Show alert if the pad is password protected
|
||||
if (hasPassword) {
|
||||
embedContent.push(h('div.alert.alert-primary', [
|
||||
h('i.fa.fa-lock'), ' ',
|
||||
Messages.share_embedPasswordAlert, h('br'),
|
||||
makeFaqLink()
|
||||
]));
|
||||
}
|
||||
|
||||
var embedButtons = [
|
||||
makeCancelButton(), {
|
||||
className: 'primary',
|
||||
@@ -1303,6 +1372,21 @@ define([
|
||||
if (!hashes.fileHash) { throw new Error("You must provide a file hash"); }
|
||||
var url = origin + pathname + '#' + hashes.fileHash;
|
||||
|
||||
// check if the file is password protected
|
||||
var parsedHref = Hash.parsePadUrl(url);
|
||||
var hasPassword = parsedHref.hashData.password;
|
||||
|
||||
var makeFaqLink = function () {
|
||||
var link = h('span', [
|
||||
h('i.fa.fa-question-circle'),
|
||||
h('a', {href: '#'}, Messages.passwordFaqLink)
|
||||
]);
|
||||
$(link).click(function () {
|
||||
common.openURL(config.origin + "/faq.html#security-pad_password");
|
||||
});
|
||||
return link;
|
||||
};
|
||||
|
||||
var getLinkValue = function () { return url; };
|
||||
|
||||
var makeCancelButton = function() {
|
||||
@@ -1314,9 +1398,40 @@ define([
|
||||
|
||||
// Share link tab
|
||||
var linkContent = [
|
||||
UI.dialog.selectable(getLinkValue(), { id: 'cp-share-link-preview', tabindex: 1 })
|
||||
UI.dialog.selectableArea(getLinkValue(), { id: 'cp-share-link-preview', tabindex: 1, rows:2 })
|
||||
];
|
||||
|
||||
// Show alert if the pad is password protected
|
||||
if (hasPassword) {
|
||||
linkContent.push(h('div.alert.alert-primary', [
|
||||
h('i.fa.fa-lock'),
|
||||
Messages.share_linkPasswordAlert, h('br'),
|
||||
makeFaqLink()
|
||||
]));
|
||||
}
|
||||
|
||||
// warning about sharing links
|
||||
var localStore = window.cryptpadStore;
|
||||
var dismissButton = h('span.fa.fa-times');
|
||||
var shareLinkWarning = h('div.alert.alert-warning.dismissable',
|
||||
{ style: 'display: none;' },
|
||||
[
|
||||
h('span.cp-inline-alert-text', Messages.share_linkWarning),
|
||||
dismissButton
|
||||
]);
|
||||
linkContent.push(shareLinkWarning);
|
||||
|
||||
localStore.get('hide-alert-shareLinkWarning', function (val) {
|
||||
if (val === '1') { return; }
|
||||
$(shareLinkWarning).show();
|
||||
|
||||
$(dismissButton).on('click', function () {
|
||||
localStore.put('hide-alert-shareLinkWarning', '1');
|
||||
$(shareLinkWarning).remove();
|
||||
});
|
||||
|
||||
});
|
||||
|
||||
var link = h('div.cp-share-modal', linkContent);
|
||||
|
||||
var linkButtons = [
|
||||
@@ -1346,7 +1461,17 @@ define([
|
||||
var friendsList = friendsObject.content;
|
||||
|
||||
var contactsContent = h('div.cp-share-modal');
|
||||
$(contactsContent).append(friendsList);
|
||||
var $contactsContent = $(contactsContent);
|
||||
$contactsContent.append(friendsList);
|
||||
|
||||
// Show alert if the pad is password protected
|
||||
if (hasPassword) {
|
||||
$contactsContent.append(h('div.alert.alert-primary', [
|
||||
h('i.fa.fa-unlock'),
|
||||
Messages.share_contactPasswordAlert, h('br'),
|
||||
makeFaqLink()
|
||||
]));
|
||||
}
|
||||
|
||||
var contactButtons = friendsObject.buttons;
|
||||
contactButtons.unshift(makeCancelButton());
|
||||
@@ -1360,12 +1485,20 @@ define([
|
||||
// Embed tab
|
||||
var embed = h('div.cp-share-modal', [
|
||||
h('p', Messages.fileEmbedScript),
|
||||
h('br'),
|
||||
UI.dialog.selectable(common.getMediatagScript()),
|
||||
h('p', Messages.fileEmbedTag),
|
||||
h('br'),
|
||||
UI.dialog.selectable(common.getMediatagFromHref(fileData)),
|
||||
]);
|
||||
|
||||
// Show alert if the pad is password protected
|
||||
if (hasPassword) {
|
||||
embed.append(h('div.alert.alert-primary', [
|
||||
h('i.fa.fa-lock'), ' ',
|
||||
Messages.share_embedPasswordAlert, h('br'),
|
||||
makeFaqLink()
|
||||
]));
|
||||
}
|
||||
|
||||
var embedButtons = [{
|
||||
className: 'cancel',
|
||||
name: Messages.cancel,
|
||||
@@ -1800,7 +1933,7 @@ define([
|
||||
if (e) { return void console.error(e); }
|
||||
UIElements.getProperties(common, data, function (e, $prop) {
|
||||
if (e) { return void console.error(e); }
|
||||
UI.alert($prop[0], undefined, true);
|
||||
UI.openCustomModal($prop[0]);
|
||||
});
|
||||
});
|
||||
});
|
||||
|
||||
@@ -1155,6 +1155,242 @@ define([
|
||||
});
|
||||
};
|
||||
|
||||
common.changeOOPassword = function (data, _cb) {
|
||||
var cb = Util.once(Util.mkAsync(_cb));
|
||||
var href = data.href;
|
||||
var newPassword = data.password;
|
||||
var teamId = data.teamId;
|
||||
if (!href) { return void cb({ error: 'EINVAL_HREF' }); }
|
||||
var parsed = Hash.parsePadUrl(href);
|
||||
if (!parsed.hash) { return void cb({ error: 'EINVAL_HREF' }); }
|
||||
if (parsed.type !== 'sheet') { return void cb({ error: 'EINVAL_TYPE' }); }
|
||||
|
||||
var warning = false;
|
||||
var newHash, newRoHref;
|
||||
var oldSecret;
|
||||
var oldMetadata;
|
||||
var oldRtChannel;
|
||||
var privateData;
|
||||
var padData;
|
||||
|
||||
var newSecret;
|
||||
if (parsed.hashData.version >= 2) {
|
||||
newSecret = Hash.getSecrets(parsed.type, parsed.hash, newPassword);
|
||||
if (!(newSecret.keys && newSecret.keys.editKeyStr)) {
|
||||
return void cb({error: 'EAUTH'});
|
||||
}
|
||||
newHash = Hash.getEditHashFromKeys(newSecret);
|
||||
}
|
||||
var newHref = '/' + parsed.type + '/#' + newHash;
|
||||
var newRtChannel = Hash.createChannelId();
|
||||
|
||||
var Crypt, Crypto;
|
||||
var cryptgetVal;
|
||||
var optsPut = {
|
||||
password: newPassword,
|
||||
metadata: {
|
||||
validateKey: newSecret.keys.validateKey
|
||||
},
|
||||
};
|
||||
|
||||
Nthen(function (waitFor) {
|
||||
common.getPadAttribute('', waitFor(function (err, _data) {
|
||||
padData = _data;
|
||||
}), href);
|
||||
}).nThen(function (waitFor) {
|
||||
oldSecret = Hash.getSecrets(parsed.type, parsed.hash, padData.password);
|
||||
|
||||
require([
|
||||
'/common/cryptget.js',
|
||||
'/bower_components/chainpad-crypto/crypto.js',
|
||||
], waitFor(function (_Crypt, _Crypto) {
|
||||
Crypt = _Crypt;
|
||||
Crypto = _Crypto;
|
||||
}));
|
||||
|
||||
common.getPadMetadata({channel: oldSecret.channel}, waitFor(function (metadata) {
|
||||
oldMetadata = metadata;
|
||||
}));
|
||||
common.getMetadata(waitFor(function (err, data) {
|
||||
if (err) {
|
||||
waitFor.abort();
|
||||
return void cb({ error: err });
|
||||
}
|
||||
privateData = data.priv;
|
||||
}));
|
||||
}).nThen(function (waitFor) {
|
||||
// Check if we're allowed to change the password
|
||||
var owners = oldMetadata.owners;
|
||||
optsPut.metadata.owners = owners;
|
||||
var edPublic = teamId ? (privateData.teams[teamId] || {}).edPublic : privateData.edPublic;
|
||||
var isOwner = Array.isArray(owners) && edPublic && owners.indexOf(edPublic) !== -1;
|
||||
if (!isOwner) {
|
||||
// We're not an owner, we shouldn't be able to change the password!
|
||||
waitFor.abort();
|
||||
return void cb({ error: 'EPERM' });
|
||||
}
|
||||
|
||||
var mailbox = oldMetadata.mailbox;
|
||||
if (mailbox) {
|
||||
// Create the encryptors to be able to decrypt and re-encrypt the mailboxes
|
||||
var oldCrypto = Crypto.createEncryptor(oldSecret.keys);
|
||||
var newCrypto = Crypto.createEncryptor(newSecret.keys);
|
||||
|
||||
var m;
|
||||
if (typeof(mailbox) === "string") {
|
||||
try {
|
||||
m = newCrypto.encrypt(oldCrypto.decrypt(mailbox, true, true));
|
||||
} catch (e) {}
|
||||
} else if (mailbox && typeof(mailbox) === "object") {
|
||||
m = {};
|
||||
Object.keys(mailbox).forEach(function (ed) {
|
||||
try {
|
||||
m[ed] = newCrypto.encrypt(oldCrypto.decrypt(mailbox[ed], true, true));
|
||||
} catch (e) {
|
||||
console.error(e);
|
||||
}
|
||||
});
|
||||
}
|
||||
optsPut.metadata.mailbox = m;
|
||||
}
|
||||
|
||||
var expire = oldMetadata.expire;
|
||||
if (expire) {
|
||||
optsPut.metadata.expire = (expire - (+new Date())) / 1000; // Lifetime in seconds
|
||||
}
|
||||
|
||||
// Get last cp (cryptget)
|
||||
Crypt.get(parsed.hash, waitFor(function (err, val) {
|
||||
if (err) {
|
||||
waitFor.abort();
|
||||
return void cb({ error: err });
|
||||
}
|
||||
try {
|
||||
cryptgetVal = JSON.parse(val);
|
||||
if (!cryptgetVal.content) {
|
||||
waitFor.abort();
|
||||
return void cb({ error: 'INVALID_CONTENT' });
|
||||
}
|
||||
} catch (e) {
|
||||
waitFor.abort();
|
||||
return void cb({ error: 'CANT_PARSE' });
|
||||
}
|
||||
}), {
|
||||
password: padData.password
|
||||
});
|
||||
}).nThen(function (waitFor) {
|
||||
// Re-encrypt rtchannel
|
||||
oldRtChannel = Util.find(cryptgetVal, ['content', 'channel']);
|
||||
var newCrypto = Crypto.createEncryptor(newSecret.keys);
|
||||
var oldCrypto = Crypto.createEncryptor(oldSecret.keys);
|
||||
var cps = Util.find(cryptgetVal, ['content', 'hashes']);
|
||||
var l = Object.keys(cps).length;
|
||||
var lastCp = l ? cps[l] : {};
|
||||
cryptgetVal.content.hashes = {};
|
||||
common.getHistory({
|
||||
channel: oldRtChannel,
|
||||
lastKnownHash: lastCp.hash
|
||||
}, waitFor(function (obj) {
|
||||
if (obj && obj.error) {
|
||||
waitFor.abort();
|
||||
console.error(obj);
|
||||
return void cb(obj.error);
|
||||
}
|
||||
var msgs = obj;
|
||||
var newHistory = msgs.map(function (str) {
|
||||
try {
|
||||
var d = oldCrypto.decrypt(str, true, true);
|
||||
return newCrypto.encrypt(d);
|
||||
} catch (e) {
|
||||
console.log(e);
|
||||
waitFor.abort();
|
||||
return void cb({error: e});
|
||||
}
|
||||
});
|
||||
// Update last knwon hash in cryptgetVal
|
||||
if (lastCp) {
|
||||
lastCp.hash = newHistory[0].slice(0, 64);
|
||||
lastCp.index = 50;
|
||||
cryptgetVal.content.hashes[1] = lastCp;
|
||||
}
|
||||
common.onlyoffice.execCommand({
|
||||
cmd: 'REENCRYPT',
|
||||
data: {
|
||||
channel: newRtChannel,
|
||||
msgs: newHistory,
|
||||
metadata: optsPut.metadata
|
||||
}
|
||||
}, waitFor(function (obj) {
|
||||
if (obj && obj.error) {
|
||||
waitFor.abort();
|
||||
console.warn(obj);
|
||||
return void cb(obj.error);
|
||||
}
|
||||
}));
|
||||
}));
|
||||
}).nThen(function (waitFor) {
|
||||
// The new rt channel is ready
|
||||
// The blob uses its own encryption and doesn't need to be reencrypted
|
||||
cryptgetVal.content.channel = newRtChannel;
|
||||
Crypt.put(newHash, JSON.stringify(cryptgetVal), waitFor(function (err) {
|
||||
if (err) {
|
||||
waitFor.abort();
|
||||
return void cb({ error: err });
|
||||
}
|
||||
}), optsPut);
|
||||
}).nThen(function (waitFor) {
|
||||
pad.leavePad({
|
||||
channel: oldSecret.channel
|
||||
}, waitFor());
|
||||
pad.onDisconnectEvent.fire(true);
|
||||
}).nThen(function (waitFor) {
|
||||
// Set the new password to our pad data
|
||||
common.setPadAttribute('password', newPassword, waitFor(function (err) {
|
||||
if (err) { warning = true; }
|
||||
}), href);
|
||||
common.setPadAttribute('channel', newSecret.channel, waitFor(function (err) {
|
||||
if (err) { warning = true; }
|
||||
}), href);
|
||||
common.setPadAttribute('rtChannel', newRtChannel, waitFor(function (err) {
|
||||
if (err) { warning = true; }
|
||||
}), href);
|
||||
var viewHash = Hash.getViewHashFromKeys(newSecret);
|
||||
newRoHref = '/' + parsed.type + '/#' + viewHash;
|
||||
common.setPadAttribute('roHref', newRoHref, waitFor(function (err) {
|
||||
if (err) { warning = true; }
|
||||
}), href);
|
||||
|
||||
if (parsed.hashData.password && newPassword) { return; } // same hash
|
||||
common.setPadAttribute('href', newHref, waitFor(function (err) {
|
||||
if (err) { warning = true; }
|
||||
}), href);
|
||||
}).nThen(function (waitFor) {
|
||||
// delete the old pad
|
||||
common.removeOwnedChannel({
|
||||
channel: oldSecret.channel,
|
||||
teamId: teamId
|
||||
}, waitFor(function (obj) {
|
||||
if (obj && obj.error) {
|
||||
waitFor.abort();
|
||||
console.info(obj);
|
||||
return void cb(obj.error);
|
||||
}
|
||||
common.removeOwnedChannel({
|
||||
channel: oldRtChannel,
|
||||
teamId: teamId
|
||||
}, waitFor());
|
||||
}));
|
||||
}).nThen(function () {
|
||||
cb({
|
||||
warning: warning,
|
||||
hash: newHash,
|
||||
href: newHref,
|
||||
roHref: newRoHref
|
||||
});
|
||||
});
|
||||
};
|
||||
|
||||
|
||||
common.changeUserPassword = function (Crypt, edPublic, data, cb) {
|
||||
if (!edPublic) {
|
||||
return void cb({
|
||||
@@ -1350,6 +1586,9 @@ define([
|
||||
common.getFullHistory = function (data, cb) {
|
||||
postMessage("GET_FULL_HISTORY", data, cb, {timeout: 180000});
|
||||
};
|
||||
common.getHistory = function (data, cb) {
|
||||
postMessage("GET_HISTORY", data, cb, {timeout: 180000});
|
||||
};
|
||||
common.getHistoryRange = function (data, cb) {
|
||||
postMessage("GET_HISTORY_RANGE", data, cb);
|
||||
};
|
||||
|
||||
@@ -197,7 +197,6 @@ define([
|
||||
'APPLET',
|
||||
'VIDEO', // privacy implications of videos are the same as images
|
||||
'AUDIO', // same with audio
|
||||
'SVG'
|
||||
];
|
||||
var unsafeTag = function (info) {
|
||||
/*if (info.node && $(info.node).parents('media-tag').length) {
|
||||
@@ -307,8 +306,39 @@ define([
|
||||
|
||||
var Dom = domFromHTML($('<div>').append($div).html());
|
||||
$content[0].normalize();
|
||||
$content.find('pre.mermaid[data-processed="true"]').remove();
|
||||
|
||||
var mermaid_source = [];
|
||||
var mermaid_cache = {};
|
||||
|
||||
// iterate over the unrendered mermaid inputs, caching their source as you go
|
||||
$(newDomFixed).find('pre.mermaid').each(function (index, el) {
|
||||
if (el.childNodes.length === 1 && el.childNodes[0].nodeType === 3) {
|
||||
var src = el.childNodes[0].wholeText;
|
||||
el.setAttribute('mermaid-source', src);
|
||||
mermaid_source[index] = src;
|
||||
}
|
||||
});
|
||||
|
||||
// iterate over rendered mermaid charts
|
||||
$content.find('pre.mermaid:not([processed="true"])').each(function (index, el) {
|
||||
// retrieve the attached source code which it was drawn
|
||||
var src = el.getAttribute('mermaid-source');
|
||||
|
||||
// check if that source exists in the set of charts which are about to be rendered
|
||||
if (mermaid_source.indexOf(src) === -1) {
|
||||
// if it's not, then you can remove it
|
||||
if (el.parentNode && el.parentNode.children.length) {
|
||||
el.parentNode.removeChild(el);
|
||||
}
|
||||
} else if (el.childNodes.length === 1 && el.childNodes[0].nodeType !== 3) {
|
||||
// otherwise, confirm that the content of the rendered chart is not a text node
|
||||
// and keep a copy of it
|
||||
mermaid_cache[src] = el.childNodes[0];
|
||||
}
|
||||
});
|
||||
|
||||
var oldDom = domFromHTML($content[0].outerHTML);
|
||||
|
||||
var patch = makeDiff(oldDom, Dom, id);
|
||||
if (typeof(patch) === 'string') {
|
||||
throw new Error(patch);
|
||||
@@ -348,8 +378,32 @@ define([
|
||||
var target = document.getElementById($a.attr('data-href'));
|
||||
if (target) { target.scrollIntoView(); }
|
||||
});
|
||||
|
||||
// loop over mermaid elements in the rendered content
|
||||
$content.find('pre.mermaid').each(function (index, el) {
|
||||
// since you've simply drawn the content that was supplied via markdown
|
||||
// you can assume that the index of your rendered charts matches that
|
||||
// of those in the markdown source.
|
||||
var src = mermaid_source[index];
|
||||
el.setAttribute('mermaid-source', src);
|
||||
var cached = mermaid_cache[src];
|
||||
|
||||
// check if you had cached a pre-rendered instance of the supplied source
|
||||
if (typeof(cached) !== 'object') { return; }
|
||||
|
||||
// if there's a cached rendering, empty out the contained source code
|
||||
// which would otherwise be drawn again.
|
||||
// apparently this is the fastest way to empty out an element
|
||||
while (el.firstChild) { el.removeChild(el.firstChild); } //el.innerHTML = '';
|
||||
// insert the cached graph
|
||||
el.appendChild(cached);
|
||||
// and set a flag indicating that this graph need not be reprocessed
|
||||
el.setAttribute('data-processed', true);
|
||||
});
|
||||
|
||||
try {
|
||||
Mermaid.init();
|
||||
// finally, draw any graphs which have changed and were thus not cached
|
||||
Mermaid.init(undefined, $content.find('pre.mermaid:not([data-processed="true"])'));
|
||||
} catch (e) { console.error(e); }
|
||||
}
|
||||
};
|
||||
|
||||
@@ -4187,7 +4187,7 @@ define([
|
||||
}
|
||||
getProperties(el, function (e, $prop) {
|
||||
if (e) { return void logError(e); }
|
||||
UI.alert($prop[0], undefined, true);
|
||||
UI.openCustomModal($prop[0]);
|
||||
});
|
||||
}
|
||||
else if ($this.hasClass("cp-app-drive-context-hashtag")) {
|
||||
|
||||
@@ -1693,7 +1693,7 @@ define([
|
||||
// GET_FULL_HISTORY from sframe-common-outer
|
||||
Store.getFullHistory = function (clientId, data, cb) {
|
||||
var network = store.network;
|
||||
var hkn = network.historyKeeper;
|
||||
var hk = network.historyKeeper;
|
||||
//var crypto = Crypto.createEncryptor(data.keys);
|
||||
// Get the history messages and send them to the iframe
|
||||
var parse = function (msg) {
|
||||
@@ -1708,8 +1708,10 @@ define([
|
||||
var onMsg = function (msg) {
|
||||
if (completed) { return; }
|
||||
var parsed = parse(msg);
|
||||
if (!parsed) { return; }
|
||||
if (parsed[0] === 'FULL_HISTORY_END') {
|
||||
cb(msgs);
|
||||
network.off('message', onMsg);
|
||||
completed = true;
|
||||
return;
|
||||
}
|
||||
@@ -1726,12 +1728,69 @@ define([
|
||||
}
|
||||
};
|
||||
network.on('message', onMsg);
|
||||
network.sendto(hkn, JSON.stringify(['GET_FULL_HISTORY', data.channel, data.validateKey]));
|
||||
network.sendto(hk, JSON.stringify(['GET_FULL_HISTORY', data.channel, data.validateKey]));
|
||||
};
|
||||
|
||||
Store.getHistory = function (clientId, data, cb) {
|
||||
var network = store.network;
|
||||
var hk = network.historyKeeper;
|
||||
|
||||
var parse = function (msg) {
|
||||
try {
|
||||
return JSON.parse(msg);
|
||||
} catch (e) {
|
||||
return null;
|
||||
}
|
||||
};
|
||||
|
||||
var msgs = [];
|
||||
var completed = false;
|
||||
var onMsg = function (msg, sender) {
|
||||
if (completed) { return; }
|
||||
if (sender !== hk) { return; }
|
||||
var parsed = parse(msg);
|
||||
if (!parsed) { return; }
|
||||
|
||||
// Ignore the metadata message
|
||||
if (parsed.validateKey && parsed.channel) { return; }
|
||||
if (parsed.error && parsed.channel) {
|
||||
if (parsed.channel === data.channel) {
|
||||
network.off('message', onMsg);
|
||||
completed = true;
|
||||
cb({error: parsed.error});
|
||||
}
|
||||
return;
|
||||
}
|
||||
|
||||
// End of history: cb
|
||||
if (parsed.state === 1 && parsed.channel) {
|
||||
if (parsed.channel !== data.channel) { return; }
|
||||
cb(msgs);
|
||||
network.off('message', onMsg);
|
||||
completed = true;
|
||||
return;
|
||||
}
|
||||
|
||||
msg = parsed[4];
|
||||
// Keep only the history for our channel
|
||||
if (parsed[3] !== data.channel) { return; }
|
||||
if (msg) {
|
||||
msg = msg.replace(/cp\|(([A-Za-z0-9+\/=]+)\|)?/, '');
|
||||
msgs.push(msg);
|
||||
}
|
||||
};
|
||||
network.on('message', onMsg);
|
||||
|
||||
var cfg = {
|
||||
lastKnownHash: data.lastKnownHash
|
||||
};
|
||||
var msg = ['GET_HISTORY', data.channel, cfg];
|
||||
network.sendto(hk, JSON.stringify(msg));
|
||||
};
|
||||
|
||||
Store.getHistoryRange = function (clientId, data, cb) {
|
||||
var network = store.network;
|
||||
var hkn = network.historyKeeper;
|
||||
var hk = network.historyKeeper;
|
||||
var parse = function (msg) {
|
||||
try {
|
||||
return JSON.parse(msg);
|
||||
@@ -1779,7 +1838,7 @@ define([
|
||||
};
|
||||
|
||||
network.on('message', onMsg);
|
||||
network.sendto(hkn, JSON.stringify(['GET_HISTORY_RANGE', data.channel, {
|
||||
network.sendto(hk, JSON.stringify(['GET_HISTORY_RANGE', data.channel, {
|
||||
from: data.lastKnownHash,
|
||||
cpCount: 2,
|
||||
txid: txid
|
||||
|
||||
@@ -200,6 +200,41 @@ define([
|
||||
}));
|
||||
};
|
||||
|
||||
var reencrypt = function (ctx, data, cId, cb) {
|
||||
var channel = data.channel;
|
||||
var network = ctx.store.network;
|
||||
|
||||
var onOpen = function (wc) {
|
||||
var hk = network.historyKeeper;
|
||||
var cfg = {
|
||||
metadata: data.metadata
|
||||
};
|
||||
var msg = ['GET_HISTORY', wc.id, cfg];
|
||||
network.sendto(hk, JSON.stringify(msg));
|
||||
data.msgs.forEach(function (msg) {
|
||||
wc.bcast(msg);
|
||||
});
|
||||
wc.leave();
|
||||
cb();
|
||||
};
|
||||
|
||||
ctx.store.anon_rpc.send("IS_NEW_CHANNEL", channel, function (e, response) {
|
||||
if (e) { return void cb({error: e}); }
|
||||
var isNew;
|
||||
if (response && response.length && typeof(response[0]) === 'boolean') {
|
||||
isNew = response[0];
|
||||
} else {
|
||||
cb({error: 'INVALID_RESPONSE'});
|
||||
}
|
||||
if (!isNew) { return void cb({error: 'EEXISTS'}); }
|
||||
|
||||
// Channel is new: we can push our reencrypted history
|
||||
network.join(channel).then(onOpen, function (err) {
|
||||
return void cb({error: err});
|
||||
});
|
||||
});
|
||||
};
|
||||
|
||||
var leaveChannel = function (ctx, padChan) {
|
||||
// Leave channel and prevent reconnect when we leave a pad
|
||||
Object.keys(ctx.channels).some(function (ooChan) {
|
||||
@@ -267,6 +302,9 @@ define([
|
||||
if (cmd === 'OPEN_CHANNEL') {
|
||||
return void openChannel(ctx, data, clientId, cb);
|
||||
}
|
||||
if (cmd === 'REENCRYPT') {
|
||||
return void reencrypt(ctx, data, clientId, cb);
|
||||
}
|
||||
};
|
||||
|
||||
return oo;
|
||||
|
||||
@@ -73,6 +73,7 @@ define([
|
||||
JOIN_PAD: Store.joinPad,
|
||||
LEAVE_PAD: Store.leavePad,
|
||||
GET_FULL_HISTORY: Store.getFullHistory,
|
||||
GET_HISTORY: Store.getHistory,
|
||||
GET_HISTORY_RANGE: Store.getHistoryRange,
|
||||
IS_NEW_CHANNEL: Store.isNewChannel,
|
||||
REQUEST_PAD_ACCESS: Store.requestPadAccess,
|
||||
|
||||
@@ -493,6 +493,20 @@ define([
|
||||
Cryptpad.storeInTeam(data, cb);
|
||||
});
|
||||
|
||||
sframeChan.on('EV_GOTO_URL', function (url) {
|
||||
if (url) {
|
||||
window.location.href = url;
|
||||
} else {
|
||||
window.location.reload();
|
||||
}
|
||||
});
|
||||
|
||||
sframeChan.on('EV_OPEN_URL', function (url) {
|
||||
if (url) {
|
||||
window.open(url);
|
||||
}
|
||||
});
|
||||
|
||||
};
|
||||
addCommonRpc(sframeChan);
|
||||
|
||||
@@ -956,20 +970,6 @@ define([
|
||||
});
|
||||
});
|
||||
|
||||
sframeChan.on('EV_GOTO_URL', function (url) {
|
||||
if (url) {
|
||||
window.location.href = url;
|
||||
} else {
|
||||
window.location.reload();
|
||||
}
|
||||
});
|
||||
|
||||
sframeChan.on('EV_OPEN_URL', function (url) {
|
||||
if (url) {
|
||||
window.open(url);
|
||||
}
|
||||
});
|
||||
|
||||
sframeChan.on('Q_PIN_GET_USAGE', function (teamId, cb) {
|
||||
Cryptpad.isOverPinLimit(teamId, function (err, overLimit, data) {
|
||||
cb({
|
||||
@@ -1008,6 +1008,11 @@ define([
|
||||
}, cb);
|
||||
});
|
||||
|
||||
sframeChan.on('Q_OO_PASSWORD_CHANGE', function (data, cb) {
|
||||
data.href = data.href || window.location.href;
|
||||
Cryptpad.changeOOPassword(data, cb);
|
||||
});
|
||||
|
||||
sframeChan.on('Q_PAD_PASSWORD_CHANGE', function (data, cb) {
|
||||
data.href = data.href || window.location.href;
|
||||
Cryptpad.changePadPassword(Cryptget, Crypto, data, cb);
|
||||
|
||||
@@ -533,7 +533,7 @@ MessengerUI, Messages) {
|
||||
Common.getSframeChannel().event('EV_SHARE_OPEN', {
|
||||
hidden: true
|
||||
});
|
||||
$shareBlock.click(function () {
|
||||
$shareBlock.click(function () {
|
||||
var title = (config.title && config.title.getTitle && config.title.getTitle())
|
||||
|| (config.title && config.title.defaultName)
|
||||
|| "";
|
||||
|
||||
Reference in New Issue
Block a user