define([ '/api/config', '/customize/messages.js', '/common/common-util.js', '/common/common-hash.js', '/common/outer/cache-store.js', '/common/common-messaging.js', '/common/common-constants.js', '/common/common-feedback.js', '/common/visible.js', '/common/userObject.js', '/common/outer/local-store.js', '/common/outer/worker-channel.js', '/common/outer/login-block.js', '/customize/application_config.js', '/bower_components/nthen/index.js', ], function (Config, Messages, Util, Hash, Cache, Messaging, Constants, Feedback, Visible, UserObject, LocalStore, Channel, Block, AppConfig, Nthen) { /* This file exposes functionality which is specific to Cryptpad, but not to any particular pad type. This includes functions for committing metadata about pads to your local storage for future use and improved usability. Additionally, there is some basic functionality for import/export. */ var urlArgs = Util.find(Config, ['requireConf', 'urlArgs']) || ''; var postMessage = function (/*cmd, data, cb*/) { /*setTimeout(function () { AStore.query(cmd, data, cb); });*/ console.error('NOT_READY'); }; var tryParsing = function (x) { try { return JSON.parse(x); } catch (e) { console.error(e); return null; } }; // Upgrade and donate URLs duplicated in pages.js var origin = encodeURIComponent(window.location.hostname); var common = window.Cryptpad = { Messages: Messages, donateURL: AppConfig.donateURL || "https://opencollective.com/cryptpad/", upgradeURL: AppConfig.upgradeURL || 'https://accounts.cryptpad.fr/#/?on=' + origin, account: {}, }; // Store the href in memory // This is a placeholder value overriden in common.ready from sframe-common-outer var currentPad = common.currentPad = { href: window.location.href }; // COMMON common.getLanguage = function () { return Messages._languageUsed; }; common.setLanguage = function (l, cb) { var LS_LANG = "CRYPTPAD_LANG"; localStorage.setItem(LS_LANG, l); postMessage("SET_ATTRIBUTE", { attr: ['general', 'language'], value: l }, cb); }; common.getAccessKeys = function (cb) { var keys = []; Nthen(function (waitFor) { // Push account keys postMessage("GET", { key: ['edPrivate'], }, waitFor(function (obj) { if (obj.error) { return; } try { keys.push({ edPrivate: obj, edPublic: Hash.getSignPublicFromPrivate(obj) }); } catch (e) { console.error(e); } })); // Push teams keys postMessage("GET", { key: ['teams'], }, waitFor(function (obj) { if (obj.error) { return; } Object.keys(obj || {}).forEach(function (id) { var t = obj[id]; var _keys = t.keys.drive || {}; if (!_keys.edPrivate) { return; } keys.push(t.keys.drive); }); })); }).nThen(function () { cb(keys); }); }; common.makeNetwork = function (cb) { require([ '/bower_components/netflux-websocket/netflux-client.js', '/common/outer/network-config.js' ], function (Netflux, NetConfig) { var wsUrl = NetConfig.getWebsocketURL(); Netflux.connect(wsUrl).then(function (network) { cb(null, network); }, function (err) { cb(err); }); }); }; common.getTeamsId = function () { postMessage("GET", { key: ['teams'], }, function (obj) { if (obj.error) { return; } Object.keys(obj || {}).forEach(function (id) { console.log(obj[id].metadata.name, ':', id); }); }); }; common.fixFork = function (teamId) { var i = 0; var send = function () { if (i >= 110) { postMessage("SET", { teamId: teamId, key: ['fixFork'], }, function () {}); return; } postMessage("SET", { teamId: teamId, key: ['fixFork'], value: i }, function () { i++; setTimeout(send, 500); }); }; send(); }; common.fixRosterHash = function () { // Push teams keys postMessage("GET", { key: ['teams'], }, function (obj) { if (obj.error) { return console.error(obj.error); } Object.keys(obj || {}).forEach(function (id) { postMessage("SET", { key: ['teams', id, 'keys', 'roster', 'lastKnownHash'], value: '' }, function () { console.log('done, please close all your CryptPad tabs before testing the fix'); }); }); }); }; (function () { var bypassHashChange = function (key) { return function (value) { var ohc = window.onhashchange; window.onhashchange = function () {}; window.location[key] = value; window.onhashchange = ohc; ohc({reset: true}); }; }; common.setTabHref = bypassHashChange('href'); common.setTabHash = bypassHashChange('hash'); }()); // RESTRICTED // Settings only common.resetDrive = function (cb) { postMessage("RESET_DRIVE", null, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(); }); }; common.logoutFromAll = function (cb) { var token = Math.floor(Math.random()*Number.MAX_SAFE_INTEGER); localStorage.setItem(Constants.tokenKey, token); postMessage("SET", { key: [Constants.tokenKey], value: token }, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(); }); }; // Settings and drive and auth common.getUserObject = function (teamId, cb) { postMessage("GET", { teamId: teamId, key: [] }, function (obj) { cb(obj); }); }; common.getSharedFolder = function (data, cb) { postMessage("GET_SHARED_FOLDER", data, function (obj) { cb(obj); }); }; common.loadSharedFolder = function (id, data, cb) { postMessage("LOAD_SHARED_FOLDER", { id: id, data: data }, cb); }; common.getEdPublic = function (teamId, cb) { postMessage("GET", { key: teamId ? ['teams', teamId, 'keys', 'drive', 'edPublic'] : ['edPublic'] }, function (obj) { cb(obj); }); }; // Settings and ready common.mergeAnonDrive = function (cb) { var data = { anonHash: LocalStore.getFSHash() }; postMessage("MIGRATE_ANON_DRIVE", data, cb); }; // Settings common.deleteAccount = function (cb) { postMessage("DELETE_ACCOUNT", null, function (obj) { if (obj.state) { Feedback.send('DELETE_ACCOUNT_AUTOMATIC'); } else { Feedback.send('DELETE_ACCOUNT_MANUAL'); } cb(obj); }); }; // Drive common.userObjectCommand = function (data, cb) { postMessage("DRIVE_USEROBJECT", data, cb); }; common.restoreDrive = function (data, cb) { if (data.sfId) { // Shared folder ID postMessage('RESTORE_SHARED_FOLDER', data, cb, { timeout: 5 * 60 * 1000 }); return; } postMessage("SET", { teamId: data.teamId, key:['drive'], value: data.drive }, function (obj) { cb(obj); }, { timeout: 5 * 60 * 1000 }); }; common.addSharedFolder = function (teamId, secret, cb) { var href = (secret.keys && secret.keys.editKeyStr) ? '/drive/#' + Hash.getEditHashFromKeys(secret) : undefined; postMessage("ADD_SHARED_FOLDER", { teamId: teamId, path: ['root'], folderData: { href: href, roHref: '/drive/#' + Hash.getViewHashFromKeys(secret), channel: secret.channel, password: secret.password, ctime: +new Date() } }, cb); }; common.drive = {}; common.drive.onLog = Util.mkEvent(); common.drive.onChange = Util.mkEvent(); common.drive.onRemove = Util.mkEvent(); // Profile common.getProfileEditUrl = function (cb) { postMessage("GET", { key: ['profile', 'edit'] }, function (obj) { cb(obj); }); }; common.setNewProfile = function (profile) { postMessage("SET", { key: ['profile'], value: profile }, function () {}); }; common.setAvatar = function (data, cb) { var postData = { key: ['profile', 'avatar'] }; // If we don't have "data", it means we want to remove the avatar and we should not have a // "postData.value", even set to undefined (JSON.stringify transforms undefined to null) if (data) { postData.value = data; } postMessage("SET", postData, cb); }; // Todo common.getTodoHash = function (cb) { postMessage("GET", { key: ['todo'] }, function (obj) { cb(obj); }); }; common.setTodoHash = function (hash) { postMessage("SET", { key: ['todo'], value: hash }, function () {}); }; // RPC common.pinPads = function (pads, cb, teamId) { var data = { teamId: teamId, pads: pads }; postMessage("PIN_PADS", data, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(null, obj.hash); }); }; common.unpinPads = function (pads, cb, teamId) { var data = { teamId: teamId, pads: pads }; postMessage("UNPIN_PADS", data, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(null, obj.hash); }); }; common.getPinnedUsage = function (data, cb) { postMessage("GET_PINNED_USAGE", data, function (obj) { if (obj.error) { return void cb(obj.error); } cb(null, obj.bytes); }); }; common.updatePinLimit = function (cb) { postMessage("UPDATE_PIN_LIMIT", null, function (obj) { if (obj.error) { return void cb(obj.error); } cb(undefined, obj.limit, obj.plan, obj.note); }); }; common.getPinLimit = function (data, cb) { postMessage("GET_PIN_LIMIT", data, function (obj) { if (obj.error) { return void cb(obj.error); } cb(undefined, obj.limit, obj.plan, obj.note); }); }; common.isOverPinLimit = function (teamId, cb) { if (!LocalStore.isLoggedIn()) { return void cb(null, false); } var usage; var andThen = function (e, limit, plan) { if (e) { return void cb(e); } var data = {usage: usage, limit: limit, plan: plan}; if (usage > limit) { return void cb (null, true, data); } return void cb (null, false, data); }; var todo = function (e, used) { if (e) { return void cb(e); } usage = used; common.getPinLimit({ teamId: teamId }, andThen); }; common.getPinnedUsage({ teamId: teamId }, todo); }; common.clearOwnedChannel = function (channel, cb) { postMessage("CLEAR_OWNED_CHANNEL", channel, cb); }; // "force" allows you to delete your drive ID common.removeOwnedChannel = function (data, cb) { postMessage("REMOVE_OWNED_CHANNEL", data, cb); }; common.getDeletedPads = function (data, cb) { postMessage("GET_DELETED_PADS", data, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(null, obj); }); }; common.uploadComplete = function (teamId, id, owned, cb) { postMessage("UPLOAD_COMPLETE", {teamId: teamId, id: id, owned: owned}, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(null, obj); }); }; common.uploadStatus = function (teamId, size, cb) { postMessage("UPLOAD_STATUS", {teamId: teamId, size: size}, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(null, obj); }); }; common.uploadCancel = function (teamId, size, cb) { postMessage("UPLOAD_CANCEL", {teamId: teamId, size: size}, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(null, obj); }); }; common.uploadChunk = function (teamId, data, cb) { postMessage("UPLOAD_CHUNK", {teamId: teamId, chunk: data}, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(null, obj); }); }; common.writeLoginBlock = function (data, cb) { postMessage('WRITE_LOGIN_BLOCK', data, function (obj) { cb(obj); }); }; common.removeLoginBlock = function (data, cb) { postMessage('REMOVE_LOGIN_BLOCK', data, function (obj) { cb(obj); }); }; // ANON RPC // SFRAME: talk to anon_rpc from the iframe common.anonRpcMsg = function (msg, data, cb) { if (!msg) { return; } postMessage("ANON_RPC_MESSAGE", { msg: msg, data: data }, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(null, obj); }); }; common.getFileSize = function (href, password, _cb) { var cb = Util.once(Util.mkAsync(_cb)); var channel = Hash.hrefToHexChannelId(href, password); var error; Nthen(function (waitFor) { // Blobs can't change, if it's in the cache, use it Cache.getBlobCache(channel, waitFor(function(err, blob) { if (err) { return; } waitFor.abort(); cb(null, blob.length); })); }).nThen(function (waitFor) { // If it's not in the cache or it's not a blob, try to get the value from the server postMessage("GET_FILE_SIZE", {channel:channel}, waitFor(function (obj) { if (obj && obj.error) { // If disconnected, try to get the value from the channel cache (next nThen) error = obj.error; return; } waitFor.abort(); cb(undefined, obj.size); })); }).nThen(function () { Cache.getChannelCache(channel, function(err, data) { if (err) { return void cb(error); } var size = data && Array.isArray(data.c) && data.c.join('').length; cb(null, size || 0); }); }); }; common.getMultipleFileSize = function (files, cb) { postMessage("GET_MULTIPLE_FILE_SIZE", {files:files}, function (obj) { if (obj.error) { return void cb(obj.error); } cb(undefined, obj.size); }); }; common.isNewChannel = function (href, password, _cb) { var cb = Util.once(Util.mkAsync(_cb)); var channel = Hash.hrefToHexChannelId(href, password); var error; Nthen(function (waitFor) { // If it's not in the cache or it's not a blob, try to get the value from the server postMessage('IS_NEW_CHANNEL', {channel: channel}, waitFor(function (obj) { if (obj && obj.error) { error = obj.error; return; } if (!obj) { error = "INVALID_RESPONSE"; return; } waitFor.abort(); cb(undefined, obj.isNew); })); }).nThen(function () { Cache.getChannelCache(channel, function(err, data) { if (err || !data) { return void cb(error); } cb(null, false); }); }); }; // Store common.getMetadata = function (cb) { var parsed = Hash.parsePadUrl(currentPad.href); postMessage("GET_METADATA", parsed && parsed.type, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(null, obj); }); }; common.isOnlyInSharedFolder = function (data, cb) { postMessage("IS_ONLY_IN_SHARED_FOLDER", data, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(null, obj); }); }; common.setDisplayName = function (value, cb) { postMessage("SET_DISPLAY_NAME", value, cb); }; common.setPadAttribute = function (attr, value, cb, href) { cb = cb || function () {}; href = Hash.getRelativeHref(href || currentPad.href); postMessage("SET_PAD_ATTRIBUTE", { href: href, attr: attr, value: value }, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(); }); }; common.getPadAttribute = function (attr, cb, href) { href = Hash.getRelativeHref(href || currentPad.href); if (!href) { return void cb('E404'); } postMessage("GET_PAD_ATTRIBUTE", { href: href, attr: attr, }, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(null, obj); }); }; common.setAttribute = function (attr, value, cb) { cb = cb || function () {}; postMessage("SET_ATTRIBUTE", { attr: attr, value: value }, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(); }); }; common.getAttribute = function (attr, cb) { postMessage("GET_ATTRIBUTE", { attr: attr }, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(null, obj); }); }; // Tags common.resetTags = function (href, tags, cb) { // set pad attribute cb = cb || function () {}; if (!Array.isArray(tags)) { return void cb('INVALID_TAGS'); } common.setPadAttribute('tags', tags.slice(), cb, href); }; common.tagPad = function (href, tag, cb) { if (typeof(cb) !== 'function') { return void console.error('EXPECTED_CALLBACK'); } if (typeof(tag) !== 'string') { return void cb('INVALID_TAG'); } common.getPadAttribute('tags', function (e, tags) { if (e) { return void cb(e); } var newTags; if (!tags) { newTags = [tag]; } else if (tags.indexOf(tag) === -1) { newTags = tags.slice(); newTags.push(tag); } common.setPadAttribute('tags', newTags, cb, href); }, href); }; common.untagPad = function (href, tag, cb) { if (typeof(cb) !== 'function') { return void console.error('EXPECTED_CALLBACK'); } if (typeof(tag) !== 'string') { return void cb('INVALID_TAG'); } common.getPadAttribute('tags', function (e, tags) { if (e) { return void cb(e); } if (!tags) { return void cb(); } var idx = tags.indexOf(tag); if (idx === -1) { return void cb(); } var newTags = tags.slice(); newTags.splice(idx, 1); common.setPadAttribute('tags', newTags, cb, href); }, href); }; common.getPadTags = function (href, cb) { if (typeof(cb) !== 'function') { return; } common.getPadAttribute('tags', function (e, tags) { if (e) { return void cb(e); } cb(void 0, tags ? tags.slice() : []); }, href); }; common.listAllTags = function (cb) { postMessage("LIST_ALL_TAGS", null, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(void 0, obj); }); }; // STORAGE - TEMPLATES common.listTemplates = function (type, cb) { postMessage("GET_TEMPLATES", null, function (obj) { if (obj && obj.error) { return void cb(obj.error); } if (!Array.isArray(obj)) { return void cb ('NOT_AN_ARRAY'); } if (!type) { return void cb(null, obj); } var templates = obj.filter(function (f) { var parsed = Hash.parsePadUrl(f.href); return parsed.type === type; }); cb(null, templates); }); }; common.saveAsTemplate = function (Cryptput, data, cb) { var p = Hash.parsePadUrl(currentPad.href); if (!p.type) { return; } // PPP: password for the new template? var hash = Hash.createRandomHash(p.type); var href = '/' + p.type + '/#' + hash; var optsPut = {}; if (p.type === 'poll') { optsPut.initialState = '{}'; } // PPP: add password as cryptput option Cryptput(hash, data.toSave, function (e) { if (e) { throw new Error(e); } postMessage("ADD_PAD", { teamId: data.teamId, href: href, title: data.title, path: ['template'] }, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(); }); }, optsPut); }; common.isTemplate = function (href, cb) { var rhref = Hash.getRelativeHref(href); common.listTemplates(null, function (err, templates) { cb(void 0, templates.some(function (t) { return t.href === rhref; })); }); }; var fixPadMetadata = function (parsed, copy) { var meta; if (Array.isArray(parsed) && typeof(parsed[3]) === "object") { meta = parsed[3].metadata; // pad } else if (parsed.info) { meta = parsed.info; // poll } else { meta = parsed.metadata; } if (typeof(meta) === "object") { meta.defaultTitle = meta.title || meta.defaultTitle; if (copy) { meta.defaultTitle = Messages._getKey('copy_title', [meta.defaultTitle]); } meta.title = ""; delete meta.users; delete meta.chat2; delete meta.chat; delete meta.cursor; } }; common.useTemplate = function (data, Crypt, cb, optsPut) { // opts is used to overrides options for chainpad-netflux in cryptput // it allows us to add owners and expiration time if it is a new file var href = data.href; var parsed = Hash.parsePadUrl(href); var parsed2 = Hash.parsePadUrl(currentPad.href); if(!parsed) { throw new Error("Cannot get template hash"); } postMessage("INCREMENT_TEMPLATE_USE", href); optsPut = optsPut || {}; var optsGet = {}; if (parsed.type === 'poll') { optsGet.initialState = '{}'; } if (parsed2.type === 'poll') { optsPut.initialState = '{}'; } Nthen(function (waitFor) { if (parsed.hashData && parsed.hashData.password) { common.getPadAttribute('password', waitFor(function (err, password) { optsGet.password = password; }), href); } if (parsed2.hashData && parsed2.hashData.password && !optsPut.password) { common.getPadAttribute('password', waitFor(function (err, password) { optsPut.password = password; })); } common.getAccessKeys(waitFor(function (keys) { optsGet.accessKeys = keys; optsPut.accessKeys = keys; })); }).nThen(function () { Crypt.get(parsed.hash, function (err, val) { if (err) { return void cb(err); } if (!val) { return void cb('ENOENT'); } if (data.oo) { return void cb(val); } // OnlyOffice template: are handled in inner try { // Try to fix the title before importing the template var parsed = JSON.parse(val); fixPadMetadata(parsed); val = JSON.stringify(parsed); } catch (e) { console.log("Can't fix template title", e); } Crypt.put(parsed2.hash, val, cb, optsPut); }, optsGet); }); }; common.useFile = function (Crypt, cb, optsPut, onProgress) { var fileHost = Config.fileHost || window.location.origin; var data = common.fromFileData; var parsed = Hash.parsePadUrl(data.href); var parsed2 = Hash.parsePadUrl(currentPad.href); if (parsed2.type === 'poll') { optsPut.initialState = '{}'; } var val; Nthen(function(_waitFor) { // If pad, use cryptget if (parsed.hashData && parsed.hashData.type === 'pad') { var optsGet = { password: data.password, initialState: parsed.type === 'poll' ? '{}' : undefined }; var next = _waitFor(); Nthen(function (waitFor) { // Authenticate in case the pad os restricted common.getAccessKeys(waitFor(function (keys) { optsGet.accessKeys = keys; })); }).nThen(function () { Crypt.get(parsed.hash, function (err, _val) { if (err) { _waitFor.abort(); return void cb(err); } try { val = JSON.parse(_val); fixPadMetadata(val, true); next(); } catch (e) { _waitFor.abort(); return void cb(e.message); } }, optsGet); }); return; } var name = data.title; var secret = Hash.getSecrets(parsed.type, parsed.hash, data.password); var src = fileHost + Hash.getBlobPathFromHex(secret.channel); var key = secret.keys && secret.keys.cryptKey; var u8; var res; var mode; // Otherwise, it's a text blob "open in code": get blob data & convert format Nthen(function (waitFor) { Util.fetch(src, waitFor(function (err, _u8) { if (err) { _waitFor.abort(); return void cb(err); } u8 = _u8; }), function (progress) { onProgress(progress * 50); }, Cache); }).nThen(function (waitFor) { require(["/file/file-crypto.js"], waitFor(function (FileCrypto) { FileCrypto.decrypt(u8, key, waitFor(function (err, _res) { if (err || !_res.content) { _waitFor.abort(); return void cb(err); } res = _res; }), function (progress) { onProgress(50 + progress * 50); }); })); }).nThen(function (waitFor) { var ext = Util.parseFilename(data.title).ext; if (!ext) { mode = "text"; return; } require(["/common/modes.js"], waitFor(function (Modes) { Modes.list.some(function (fType) { if (fType.ext === ext) { mode = fType.mode; return true; } }); })); }).nThen(function (waitFor) { var reader = new FileReader(); reader.addEventListener('loadend', waitFor(function (e) { val = { content: e.srcElement.result, highlightMode: mode, metadata: { defaultTitle: name, title: name, type: "code", }, }; })); reader.readAsText(res.content); }).nThen(_waitFor()); }).nThen(function () { Crypt.put(parsed2.hash, JSON.stringify(val), function () { cb(); }, optsPut); }); }; // Forget button common.moveToTrash = function (cb, href) { href = href || currentPad.href; postMessage("MOVE_TO_TRASH", { href: href }, cb); }; // When opening a new pad or renaming it, store the new title common.setPadTitle = function (data, cb) { if (!data || typeof (data) !== "object") { return cb ('Data is not an object'); } var href = data.href || currentPad.href; var parsed = Hash.parsePadUrl(href); if (!parsed.hash) { return cb ('Invalid hash'); } data.href = parsed.getUrl({present: parsed.present}); if (typeof (data.title) !== "string") { return cb('Missing title'); } if (common.initialTeam) { // If the value is -1, it means the user drive was selected from the pad creation screen // If the value is a positive Integer, force save in the team with the selected ID if (common.initialTeam !== -1) { // Team selected from the PCS or pad created from a team drive data.teamId = common.initialTeam; } data.forceSave = 1; delete common.initialTeam; } if (common.initialPath) { if (!data.path) { data.path = Array.isArray(common.initialPath) ? common.initialPath : decodeURIComponent(common.initialPath).split(','); delete common.initialPath; } } postMessage("SET_PAD_TITLE", data, function (obj) { if (obj && obj.error) { if (obj.error !== "EAUTH") { console.log("unable to set pad title"); } return void cb(obj.error); } cb(null, obj); }); }; common.storeInTeam = function (data, cb) { if (!data.href) { return void cb({error: 'EINVAL'}); } var parsed = Hash.parsePadUrl(data.href); var secret = Hash.getSecrets(parsed.type, parsed.hash, data.password); if (!secret || !secret.channel) { return void cb ({error: 'EINVAL'}); } if (parsed.type === 'drive') { // Shared folder var teamId = data.teamId === -1 ? undefined : data.teamId; common.addSharedFolder(teamId, secret, cb); return; } Nthen(function (waitFor) { if (parsed.hashData.type !== 'pad') { return; } // Set the correct owner and expiration time if we can find them postMessage('GET_PAD_METADATA', { channel: secret.channel }, waitFor(function (obj) { if (!obj || obj.error) { return; } data.owners = obj.owners; data.expire = +obj.expire; })); }).nThen(function () { postMessage("SET_PAD_TITLE", { teamId: data.teamId, href: Hash.getRelativeHref(data.href), title: data.title, password: data.password, channel: secret.channel, path: data.path, owners: data.owners, expire: data.expire, forceSave: 1 }, function (obj) { if (obj && obj.error) { return void cb(obj.error); } cb(); }); }); }; // Needed for the secure filepicker app common.getSecureFilesList = function (query, cb) { postMessage("GET_SECURE_FILES_LIST", query, function (list) { cb(void 0, list); }); }; // Get a template href from its id common.getPadData = function (id, cb) { postMessage("GET_PAD_DATA", id, function (data) { cb(void 0, data); }); }; // Get data about a given channel: use with hidden hashes common.getPadDataFromChannel = function (obj, cb) { if (!obj || !obj.channel) { return void cb('EINVAL'); } // Note: no timeout for this command, we may only have loaded the cached drive // and need to wait for the fully synced drive postMessage("GET_PAD_DATA_FROM_CHANNEL", obj, function (data) { cb(void 0, data); }, {timeout: -1}); }; // Admin common.adminRpc = function (data, cb) { postMessage("ADMIN_RPC", data, cb); }; common.addAdminMailbox = function (data, cb) { postMessage("ADMIN_ADD_MAILBOX", data, cb); }; // Network common.onNetworkDisconnect = Util.mkEvent(); common.onNetworkReconnect = Util.mkEvent(); common.onNewVersionReconnect = Util.mkEvent(); // Messaging (friend requests) var messaging = common.messaging = {}; messaging.answerFriendRequest = function (data, cb) { postMessage("ANSWER_FRIEND_REQUEST", data, cb); }; messaging.sendFriendRequest = function (data, cb) { postMessage("SEND_FRIEND_REQUEST", data, cb); }; // Team common.anonGetPreviewContent = function (data, cb) { postMessage("ANON_GET_PREVIEW_CONTENT", data, cb); }; // Onlyoffice var onlyoffice = common.onlyoffice = {}; onlyoffice.execCommand = function (data, cb) { postMessage("OO_COMMAND", data, cb); }; onlyoffice.onEvent = Util.mkEvent(); // Cursor var cursor = common.cursor = {}; cursor.execCommand = function (data, cb) { postMessage("CURSOR_COMMAND", data, cb); }; cursor.onEvent = Util.mkEvent(); // Mailbox var mailbox = common.mailbox = {}; mailbox.execCommand = function (data, cb) { postMessage("MAILBOX_COMMAND", data, cb); }; mailbox.onEvent = Util.mkEvent(); // Universal var universal = common.universal = {}; universal.execCommand = function (data, cb) { postMessage("UNIVERSAL_COMMAND", data, cb); }; universal.onEvent = Util.mkEvent(); // Pad RPC var pad = common.padRpc = {}; pad.joinPad = function (data) { postMessage("JOIN_PAD", data); }; pad.leavePad = function (data, cb) { postMessage("LEAVE_PAD", data, cb); }; pad.sendPadMsg = function (data, cb) { // -1 ==> no timeout, we may receive the callback only when we reconnect postMessage("SEND_PAD_MSG", data, cb, { timeout: -1 }); }; pad.getLastHash = function (data, cb) { postMessage("GET_LAST_HASH", data, cb); }; pad.getSnapshot = function (data, cb) { postMessage("GET_SNAPSHOT", data, cb); }; pad.onReadyEvent = Util.mkEvent(); pad.onMessageEvent = Util.mkEvent(); pad.onJoinEvent = Util.mkEvent(); pad.onLeaveEvent = Util.mkEvent(); pad.onDisconnectEvent = Util.mkEvent(); pad.onCacheEvent = Util.mkEvent(); pad.onCacheReadyEvent = Util.mkEvent(); pad.onConnectEvent = Util.mkEvent(); pad.onErrorEvent = Util.mkEvent(); pad.onMetadataEvent = Util.mkEvent(); pad.onChannelDeleted = Util.mkEvent(); pad.requestAccess = function (data, cb) { postMessage("REQUEST_PAD_ACCESS", data, cb); }; pad.giveAccess = function (data, cb) { postMessage("GIVE_PAD_ACCESS", data, cb); }; common.onCorruptedCache = function (channel) { postMessage("CORRUPTED_CACHE", channel); }; common.setPadMetadata = function (data, cb) { postMessage('SET_PAD_METADATA', data, cb); }; common.getPadMetadata = function (data, cb) { postMessage('GET_PAD_METADATA', data, cb); }; common.burnPad = function (data) { postMessage('BURN_PAD', data); }; common.changePadPassword = function (Crypt, Crypto, data, cb) { var href = data.href; var newPassword = data.password; var teamId = data.teamId; if (!href) { return void cb({ error: 'EINVAL_HREF' }); } var parsed = Hash.parsePadUrl(href); if (!parsed.hash) { return void cb({ error: 'EINVAL_HREF' }); } var warning = false; var newHash, newRoHref; var oldChannel; var oldSecret; var oldMetadata; var newSecret; var privateData; if (parsed.hashData.version >= 2) { newSecret = Hash.getSecrets(parsed.type, parsed.hash, newPassword); if (!(newSecret.keys && newSecret.keys.editKeyStr)) { return void cb({error: 'EAUTH'}); } newHash = Hash.getEditHashFromKeys(newSecret); } else { newHash = Hash.createRandomHash(parsed.type, newPassword); newSecret = Hash.getSecrets(parsed.type, newHash, newPassword); } var newHref = '/' + parsed.type + '/#' + newHash; var isSharedFolder = parsed.type === 'drive'; var optsGet = {}; var optsPut = { password: newPassword, metadata: {}, initialState: isSharedFolder ? '{}' : undefined }; var cryptgetVal; Nthen(function (waitFor) { if (parsed.hashData && parsed.hashData.password) { common.getPadAttribute('password', waitFor(function (err, password) { optsGet.password = password; }), href); } }).nThen(function (waitFor) { oldSecret = Hash.getSecrets(parsed.type, parsed.hash, optsGet.password); oldChannel = oldSecret.channel; common.getPadMetadata({channel: oldChannel}, waitFor(function (metadata) { oldMetadata = metadata || {}; })); common.getMetadata(waitFor(function (err, data) { if (err) { waitFor.abort(); return void cb({ error: err }); } privateData = data.priv; })); }).nThen(function (waitFor) { // Get owners, mailbox and expiration time var owners = oldMetadata.owners; optsPut.metadata.owners = owners; // Check if we're allowed to change the password var edPublic = teamId ? (privateData.teams[teamId] || {}).edPublic : privateData.edPublic; var isOwner = Array.isArray(owners) && edPublic && owners.indexOf(edPublic) !== -1; if (!isOwner) { // We're not an owner, we shouldn't be able to change the password! waitFor.abort(); return void cb({ error: 'EPERM' }); } var mailbox = oldMetadata.mailbox; if (mailbox) { // Create the encryptors to be able to decrypt and re-encrypt the mailboxes var oldCrypto = Crypto.createEncryptor(oldSecret.keys); var newCrypto = Crypto.createEncryptor(newSecret.keys); var m; if (typeof(mailbox) === "string") { try { m = newCrypto.encrypt(oldCrypto.decrypt(mailbox, true, true)); } catch (e) {} } else if (mailbox && typeof(mailbox) === "object") { m = {}; Object.keys(mailbox).forEach(function (ed) { console.log(mailbox[ed]); try { m[ed] = newCrypto.encrypt(oldCrypto.decrypt(mailbox[ed], true, true)); } catch (e) { console.error(e); } }); } optsPut.metadata.mailbox = m; } var expire = oldMetadata.expire; if (expire) { optsPut.metadata.expire = (expire - (+new Date())) / 1000; // Lifetime in seconds } }).nThen(function (waitFor) { common.getAccessKeys(waitFor(function (keys) { optsGet.accessKeys = keys; optsPut.accessKeys = keys; })); }).nThen(function (waitFor) { Crypt.get(parsed.hash, waitFor(function (err, val) { if (err) { waitFor.abort(); return void cb({ error: err }); } cryptgetVal = val; if (isSharedFolder) { var parsed = JSON.parse(val || '{}'); var oldKey = parsed.version === 2 && oldSecret.keys.secondaryKey; var newKey = newSecret.keys.secondaryKey; UserObject.reencrypt(oldKey, newKey, parsed); cryptgetVal = JSON.stringify(parsed); } }), optsGet); }).nThen(function (waitFor) { optsPut.metadata.restricted = oldMetadata.restricted; optsPut.metadata.allowed = oldMetadata.allowed; Crypt.put(newHash, cryptgetVal, waitFor(function (err) { if (err) { waitFor.abort(); return void cb({ error: err }); } }), optsPut); }).nThen(function (waitFor) { if (isSharedFolder) { postMessage("UPDATE_SHARED_FOLDER_PASSWORD", { href: href, oldChannel: oldChannel, password: newPassword }, waitFor()); return; } pad.leavePad({ channel: oldChannel }, waitFor()); pad.onDisconnectEvent.fire(true); }).nThen(function (waitFor) { // Set the new password to our pad data common.setPadAttribute('password', newPassword, waitFor(function (err) { if (err) { warning = true; } }), href); common.setPadAttribute('channel', newSecret.channel, waitFor(function (err) { if (err) { warning = true; } }), href); var viewHash = Hash.getViewHashFromKeys(newSecret); newRoHref = '/' + parsed.type + '/#' + viewHash; common.setPadAttribute('roHref', newRoHref, waitFor(function (err) { if (err) { warning = true; } }), href); if (parsed.hashData.password && newPassword) { return; } // same hash common.setPadAttribute('href', newHref, waitFor(function (err) { if (err) { warning = true; } }), href); }).nThen(function (waitFor) { // delete the old pad common.removeOwnedChannel({ channel: oldChannel, teamId: teamId }, waitFor(function (obj) { if (obj && obj.error) { waitFor.abort(); return void cb(obj); } })); if (!isSharedFolder) { postMessage("CHANGE_PAD_PASSWORD_PIN", { oldChannel: oldChannel, channel: newSecret.channel }, waitFor()); } }).nThen(function () { common.drive.onChange.fire({path: ['drive', Constants.storageKey]}); cb({ warning: warning, hash: newHash, href: newHref, roHref: newRoHref, }); }); }; common.changeBlobPassword = function (data, handlers, cb) { var href = data.href; var newPassword = data.password; var teamId = data.teamId; if (!href) { return void cb({ error: 'EINVAL_HREF' }); } var parsed = Hash.parsePadUrl(href); if (!parsed.hash) { return void cb({ error: 'EINVAL_HREF' }); } if (parsed.hashData.type !== 'file') { return void cb({ error: 'EINVAL_TYPE' }); } var newSecret; var newHash; if (parsed.hashData.version >= 2) { newSecret = Hash.getSecrets(parsed.type, parsed.hash, newPassword); if (!(newSecret.keys && newSecret.keys.fileKeyStr)) { return void cb({error: 'EAUTH'}); } newHash = Hash.getFileHashFromKeys(newSecret); } else { newHash = Hash.createRandomHash(parsed.type, newPassword); newSecret = Hash.getSecrets(parsed.type, newHash, newPassword); } var newHref = '/' + parsed.type + '/#' + newHash; var fileHost = Config.fileHost || window.location.origin || ''; /* 1. get old password 2. get owners */ var oldPassword; var decrypted; var oldChannel; var warning; var FileCrypto; var MediaTag; var Upload; Nthen(function (waitFor) { if (parsed.hashData && parsed.hashData.password) { common.getPadAttribute('password', waitFor(function (err, password) { oldPassword = password || ''; }), href); } }).nThen(function (waitFor) { require([ '/file/file-crypto.js', '/common/media-tag.js', '/common/outer/upload.js', '/bower_components/tweetnacl/nacl-fast.min.js' ], waitFor(function (_FileCrypto, _MT, _Upload) { FileCrypto = _FileCrypto; MediaTag = _MT; Upload = _Upload; })); }).nThen(function (waitFor) { var oldSecret = Hash.getSecrets(parsed.type, parsed.hash, oldPassword); oldChannel = oldSecret.channel; var src = fileHost + Hash.getBlobPathFromHex(oldChannel); var key = oldSecret.keys && oldSecret.keys.cryptKey; var cryptKey = window.nacl.util.encodeBase64(key); var mt = document.createElement('media-tag'); mt.setAttribute('src', src); mt.setAttribute('data-crypto-key', 'cryptpad:'+cryptKey); MediaTag(mt).on('complete', waitFor(function (_decrypted) { decrypted = _decrypted; })).on('error', function (err) { waitFor.abort(); cb({error: err}); console.error(err); }); }).nThen(function (waitFor) { var reader = new FileReader(); reader.readAsArrayBuffer(decrypted.content); reader.onloadend = waitFor(function() { decrypted.u8 = new Uint8Array(reader.result); }); }).nThen(function (waitFor) { var key = newSecret.keys && newSecret.keys.cryptKey; var onError = function (err) { waitFor.abort(); cb({error: err}); }; Upload.uploadU8(common, { teamId: teamId, u8: decrypted.u8, metadata: decrypted.metadata, key: key, id: newSecret.channel, owned: true, onError: onError, onPending: handlers.onPending, updateProgress: handlers.updateProgress, }, waitFor()); }).nThen(function (waitFor) { // Set the new password to our pad data common.setPadAttribute('password', newPassword, waitFor(function (err) { if (err) { warning = true; } }), href); common.setPadAttribute('channel', newSecret.channel, waitFor(function (err) { if (err) { warning = true; } }), href); if (parsed.hashData.password && newPassword) { return; } // same hash common.setPadAttribute('href', newHref, waitFor(function (err) { if (err) { warning = true; } }), href); }).nThen(function (waitFor) { // delete the old pad common.removeOwnedChannel({ channel: oldChannel, teamId: teamId }, waitFor(function (obj) { if (obj && obj.error) { waitFor.abort(); return void cb(obj); } })); postMessage("CHANGE_PAD_PASSWORD_PIN", { oldChannel: oldChannel, channel: newSecret.channel }, waitFor()); }).nThen(function () { common.drive.onChange.fire({path: ['drive', Constants.storageKey]}); cb({ warning: warning, hash: newHash, href: newHref, }); }); }; common.changeOOPassword = function (data, _cb) { var cb = Util.once(Util.mkAsync(_cb)); var href = data.href; var newPassword = data.password; var teamId = data.teamId; if (!href) { return void cb({ error: 'EINVAL_HREF' }); } var parsed = Hash.parsePadUrl(href); if (!parsed.hash) { return void cb({ error: 'EINVAL_HREF' }); } if (parsed.type !== 'sheet') { return void cb({ error: 'EINVAL_TYPE' }); } var warning = false; var newHash, newRoHref; var oldSecret; var oldMetadata; var oldRtChannel; var privateData; var padData; var newSecret; if (parsed.hashData.version >= 2) { newSecret = Hash.getSecrets(parsed.type, parsed.hash, newPassword); if (!(newSecret.keys && newSecret.keys.editKeyStr)) { return void cb({error: 'EAUTH'}); } newHash = Hash.getEditHashFromKeys(newSecret); } var newHref = '/' + parsed.type + '/#' + newHash; var newRtChannel = Hash.createChannelId(); var Crypt, Crypto; var cryptgetVal; var optsPut = { password: newPassword, metadata: { validateKey: newSecret.keys.validateKey }, }; var optsGet = {}; Nthen(function (waitFor) { common.getPadAttribute('', waitFor(function (err, _data) { padData = _data; optsGet.password = padData.password; }), href); common.getAccessKeys(waitFor(function (keys) { optsGet.accessKeys = keys; optsPut.accessKeys = keys; })); }).nThen(function (waitFor) { oldSecret = Hash.getSecrets(parsed.type, parsed.hash, padData.password); require([ '/common/cryptget.js', '/bower_components/chainpad-crypto/crypto.js', ], waitFor(function (_Crypt, _Crypto) { Crypt = _Crypt; Crypto = _Crypto; })); common.getPadMetadata({channel: oldSecret.channel}, waitFor(function (metadata) { oldMetadata = metadata; })); common.getMetadata(waitFor(function (err, data) { if (err) { waitFor.abort(); return void cb({ error: err }); } privateData = data.priv; })); }).nThen(function (waitFor) { // Check if we're allowed to change the password var owners = oldMetadata.owners; optsPut.metadata.owners = owners; var edPublic = teamId ? (privateData.teams[teamId] || {}).edPublic : privateData.edPublic; var isOwner = Array.isArray(owners) && edPublic && owners.indexOf(edPublic) !== -1; if (!isOwner) { // We're not an owner, we shouldn't be able to change the password! waitFor.abort(); return void cb({ error: 'EPERM' }); } var mailbox = oldMetadata.mailbox; if (mailbox) { // Create the encryptors to be able to decrypt and re-encrypt the mailboxes var oldCrypto = Crypto.createEncryptor(oldSecret.keys); var newCrypto = Crypto.createEncryptor(newSecret.keys); var m; if (typeof(mailbox) === "string") { try { m = newCrypto.encrypt(oldCrypto.decrypt(mailbox, true, true)); } catch (e) {} } else if (mailbox && typeof(mailbox) === "object") { m = {}; Object.keys(mailbox).forEach(function (ed) { try { m[ed] = newCrypto.encrypt(oldCrypto.decrypt(mailbox[ed], true, true)); } catch (e) { console.error(e); } }); } optsPut.metadata.mailbox = m; } var expire = oldMetadata.expire; if (expire) { optsPut.metadata.expire = (expire - (+new Date())) / 1000; // Lifetime in seconds } // Get last cp (cryptget) Crypt.get(parsed.hash, waitFor(function (err, val) { if (err) { waitFor.abort(); return void cb({ error: err }); } try { cryptgetVal = JSON.parse(val); if (!cryptgetVal.content) { waitFor.abort(); return void cb({ error: 'INVALID_CONTENT' }); } } catch (e) { waitFor.abort(); return void cb({ error: 'CANT_PARSE' }); } }), optsGet); }).nThen(function (waitFor) { // Re-encrypt rtchannel oldRtChannel = Util.find(cryptgetVal, ['content', 'channel']); var newCrypto = Crypto.createEncryptor(newSecret.keys); var oldCrypto = Crypto.createEncryptor(oldSecret.keys); var cps = Util.find(cryptgetVal, ['content', 'hashes']); var l = Object.keys(cps).length; var lastCp = l ? cps[l] : {}; cryptgetVal.content.hashes = {}; common.getHistory({ channel: oldRtChannel, lastKnownHash: lastCp.hash }, waitFor(function (obj) { if (obj && obj.error) { waitFor.abort(); console.error(obj); return void cb(obj.error); } var msgs = obj; var newHistory = msgs.map(function (str) { try { var d = oldCrypto.decrypt(str, true, true); return newCrypto.encrypt(d); } catch (e) { console.log(e); waitFor.abort(); return void cb({error: e}); } }); // Update last knwon hash in cryptgetVal if (lastCp) { lastCp.hash = newHistory[0].slice(0, 64); lastCp.index = 50; cryptgetVal.content.hashes[1] = lastCp; } common.onlyoffice.execCommand({ cmd: 'REENCRYPT', data: { channel: newRtChannel, msgs: newHistory, metadata: optsPut.metadata } }, waitFor(function (obj) { if (obj && obj.error) { waitFor.abort(); console.warn(obj); return void cb(obj.error); } })); })); }).nThen(function (waitFor) { // The new rt channel is ready // The blob uses its own encryption and doesn't need to be reencrypted cryptgetVal.content.channel = newRtChannel; Crypt.put(newHash, JSON.stringify(cryptgetVal), waitFor(function (err) { if (err) { waitFor.abort(); return void cb({ error: err }); } }), optsPut); }).nThen(function (waitFor) { pad.leavePad({ channel: oldSecret.channel }, waitFor()); pad.onDisconnectEvent.fire(true); }).nThen(function (waitFor) { // Set the new password to our pad data common.setPadAttribute('password', newPassword, waitFor(function (err) { if (err) { warning = true; } }), href); common.setPadAttribute('channel', newSecret.channel, waitFor(function (err) { if (err) { warning = true; } }), href); common.setPadAttribute('rtChannel', newRtChannel, waitFor(function (err) { if (err) { warning = true; } }), href); var viewHash = Hash.getViewHashFromKeys(newSecret); newRoHref = '/' + parsed.type + '/#' + viewHash; common.setPadAttribute('roHref', newRoHref, waitFor(function (err) { if (err) { warning = true; } }), href); if (parsed.hashData.password && newPassword) { return; } // same hash common.setPadAttribute('href', newHref, waitFor(function (err) { if (err) { warning = true; } }), href); }).nThen(function (waitFor) { // delete the old pad common.removeOwnedChannel({ channel: oldSecret.channel, teamId: teamId }, waitFor(function (obj) { if (obj && obj.error) { waitFor.abort(); console.info(obj); return void cb(obj.error); } common.removeOwnedChannel({ channel: oldRtChannel, teamId: teamId }, waitFor()); })); }).nThen(function () { common.drive.onChange.fire({path: ['drive', Constants.storageKey]}); cb({ warning: warning, hash: newHash, href: newHref, roHref: newRoHref }); }); }; common.changeUserPassword = function (Crypt, edPublic, data, cb) { if (!edPublic) { return void cb({ error: 'E_NOT_LOGGED_IN' }); } var accountName = LocalStore.getAccountName(); var hash = LocalStore.getUserHash(); if (!hash) { return void cb({ error: 'E_NOT_LOGGED_IN' }); } var password = data.password; // To remove your old block var newPassword = data.newPassword; // To create your new block var secret = Hash.getSecrets('drive', hash); var newHash, newHref, newSecret, blockKeys; var oldIsOwned = false; var blockHash = LocalStore.getBlockHash(); var oldBlockKeys; var Cred, Block, Login; Nthen(function (waitFor) { require([ '/common/common-credential.js', '/common/outer/login-block.js', '/customize/login.js' ], waitFor(function (_Cred, _Block, _Login) { Cred = _Cred; Block = _Block; Login = _Login; })); }).nThen(function (waitFor) { // confirm that the provided password is correct Cred.deriveFromPassphrase(accountName, password, Login.requiredBytes, waitFor(function (bytes) { var allocated = Login.allocateBytes(bytes); oldBlockKeys = allocated.blockKeys; if (blockHash) { if (blockHash !== allocated.blockHash) { console.log("provided password did not yield the correct blockHash"); // incorrect password probably waitFor.abort(); return void cb({ error: 'INVALID_PASSWORD', }); } // the user has already created a block, so you should compare against that } else { // otherwise they're a legacy user, and we should check against the User_hash if (hash !== allocated.userHash) { console.log("provided password did not yield the correct userHash"); waitFor.abort(); return void cb({ error: 'INVALID_PASSWORD', }); } } })); }).nThen(function (waitFor) { // Check if our drive is already owned console.log("checking if old drive is owned"); common.anonRpcMsg('GET_METADATA', secret.channel, waitFor(function (err, obj) { if (err || obj.error) { return; } if (obj.owners && Array.isArray(obj.owners) && obj.owners.indexOf(edPublic) !== -1) { oldIsOwned = true; } })); }).nThen(function (waitFor) { // Create a new user hash // Get the current content, store it in the new user file // and make sure the new user drive is owned newHash = Hash.createRandomHash('drive'); newHref = '/drive/#' + newHash; newSecret = Hash.getSecrets('drive', newHash); var optsPut = { owners: [edPublic], initialState: '{}', }; console.log("copying contents of old drive to new location"); Crypt.get(hash, waitFor(function (err, val) { if (err) { waitFor.abort(); return void cb({ error: err }); } Crypt.put(newHash, val, waitFor(function (err) { if (err) { waitFor.abort(); console.error(err); return void cb({ error: err }); } }), optsPut); })); }).nThen(function (waitFor) { // Drive content copied: get the new block location console.log("deriving new credentials from passphrase"); Cred.deriveFromPassphrase(accountName, newPassword, Login.requiredBytes, waitFor(function (bytes) { var allocated = Login.allocateBytes(bytes); blockKeys = allocated.blockKeys; })); }).nThen(function (waitFor) { var blockUrl = Block.getBlockUrl(blockKeys); // Check whether there is a block at that location Util.fetch(blockUrl, waitFor(function (err, block) { // If there is no block or the block is invalid, continue. if (err) { console.log("no block found"); return; } var decryptedBlock = Block.decrypt(block, blockKeys); if (!decryptedBlock) { console.error("Found a login block but failed to decrypt"); return; } // If there is already a valid block, abort! We risk overriding another user's data waitFor.abort(); cb({ error: 'EEXISTS' }); })); }).nThen(function (waitFor) { // Write the new login block var temp = { User_name: accountName, User_hash: newHash, edPublic: edPublic, }; var content = Block.serialize(JSON.stringify(temp), blockKeys); console.log("writing new login block"); common.writeLoginBlock(content, waitFor(function (obj) { if (obj && obj.error) { waitFor.abort(); return void cb(obj); } console.log("new login block written"); var newBlockHash = Block.getBlockHash(blockKeys); LocalStore.setBlockHash(newBlockHash); })); }).nThen(function (waitFor) { // New drive hash is in login block, unpin the old one and pin the new one console.log("unpinning old drive and pinning new one"); common.unpinPads([secret.channel], waitFor()); common.pinPads([newSecret.channel], waitFor()); }).nThen(function (waitFor) { // Remove block hash if (blockHash) { console.log('removing old login block'); var removeData = Block.remove(oldBlockKeys); common.removeLoginBlock(removeData, waitFor(function (obj) { if (obj && obj.error) { return void console.error(obj.error); } })); } }).nThen(function (waitFor) { if (oldIsOwned) { console.log('removing old drive'); common.removeOwnedChannel({ channel: secret.channel, teamId: null, force: true }, waitFor(function (obj) { if (obj && obj.error) { // Deal with it as if it was not owned oldIsOwned = false; return; } common.logoutFromAll(waitFor(function () { postMessage("DISCONNECT"); })); })); } }).nThen(function (waitFor) { if (!oldIsOwned) { console.error('deprecating old drive.'); postMessage("SET", { teamId: data.teamId, key: [Constants.deprecatedKey], value: true }, waitFor(function (obj) { if (obj && obj.error) { console.error(obj.error); } common.logoutFromAll(waitFor(function () { postMessage("DISCONNECT"); })); })); } }).nThen(function () { // We have the new drive, with the new login block var feedbackKey = (password === newPassword)? 'OWNED_DRIVE_MIGRATION': 'PASSWORD_CHANGED'; Feedback.send(feedbackKey, undefined, function () { window.location.reload(); }); }); }; // Loading events common.loading = {}; common.loading.onDriveEvent = Util.mkEvent(); // (Auto)store pads common.autoStore = {}; common.autoStore.onStoreRequest = Util.mkEvent(); common.getFullHistory = function (data, cb) { postMessage("GET_FULL_HISTORY", data, cb, {timeout: 180000}); }; common.getHistory = function (data, cb) { postMessage("GET_HISTORY", data, cb, {timeout: 180000}); }; common.getHistoryRange = function (data, cb) { postMessage("GET_HISTORY_RANGE", data, cb); }; common.getShareHashes = function (secret, cb) { var hashes; if (!window.location.hash) { hashes = Hash.getHashes(secret); return void cb(null, hashes); } var parsed = Hash.parsePadUrl(currentPad.href); if (!parsed.type || !parsed.hashData) { return void cb('E_INVALID_HREF'); } hashes = Hash.getHashes(secret); // If the current href is an edit one, return the existing hashes var parsedHash = parsed.hashData; if (!parsedHash || parsedHash.mode === 'edit') { return void cb(null, hashes); } if (parsedHash.type !== 'pad') { return void cb(null, hashes); } if (secret.version === 0) { // It means we're using an old hash hashes.editHash = window.location.hash.slice(1); return void cb(null, hashes); } if (hashes.editHash) { // no need to find stronger if we already have edit hash return void cb(null, hashes); } postMessage("GET_STRONGER_HASH", { channel: secret.channel }, function (hash) { if (hash) { hashes.editHash = hash; } cb(null, hashes); }); }; var CRYPTPAD_VERSION = 'cryptpad-version'; var currentVersion = localStorage[CRYPTPAD_VERSION]; var updateLocalVersion = function (newUrlArgs) { // Check for CryptPad updates var urlArgs = newUrlArgs || (Config.requireConf ? Config.requireConf.urlArgs : null); if (!urlArgs) { return; } var arr = /ver=([0-9.]+)(-[0-9]*)?/.exec(urlArgs); var ver = arr[1]; if (!ver) { return; } var verArr = ver.split('.'); //verArr[2] = 0; if (verArr.length !== 3) { return; } var stored = currentVersion || '0.0.0'; var storedArr = stored.split('.'); //storedArr[2] = 0; var shouldUpdate = JSON.stringify(verArr) !== JSON.stringify(storedArr); /* var shouldUpdate = parseInt(verArr[0]) !== parseInt(storedArr[0]) || (parseInt(verArr[0]) === parseInt(storedArr[0]) && parseInt(verArr[1]) !== parseInt(storedArr[1])); */ if (!shouldUpdate) { return; } currentVersion = ver; localStorage[CRYPTPAD_VERSION] = ver; if (newUrlArgs) { // It's a reconnect common.onNewVersionReconnect.fire(); } return true; }; var _onMetadataChanged = []; common.onMetadataChanged = function (h) { if (typeof(h) !== "function") { return; } if (_onMetadataChanged.indexOf(h) !== -1) { return; } _onMetadataChanged.push(h); }; common.changeMetadata = function () { _onMetadataChanged.forEach(function (h) { h(); }); }; var requestLogin = function () { // log out so that you don't go into an endless loop... LocalStore.logout(function () { // redirect them to log in, and come back when they're done. var href = Hash.hashToHref('', 'login'); var url = Hash.getNewPadURL(href, { href: currentPad.href }); window.location.href = url; }); }; var provideFeedback = function () { if (typeof(window.Proxy) === 'undefined') { Feedback.send("NO_PROXIES"); } if (!common.isWebRTCSupported()) { Feedback.send("NO_WEBRTC"); } var shimPattern = /CRYPTPAD_SHIM/; if (shimPattern.test(Array.isArray.toString())) { Feedback.send("NO_ISARRAY"); } if (shimPattern.test(Array.prototype.fill.toString())) { Feedback.send("NO_ARRAYFILL"); } if (typeof(Symbol) === 'undefined') { Feedback.send('NO_SYMBOL'); } if (typeof(SharedWorker) === "undefined") { Feedback.send('NO_SHAREDWORKER'); } else { Feedback.send('SHAREDWORKER'); } if (typeof(Worker) === "undefined") { Feedback.send('NO_WEBWORKER'); } if (!('serviceWorker' in navigator)) { Feedback.send('NO_SERVICEWORKER'); } if (!common.hasCSSVariables()) { Feedback.send('NO_CSS_VARIABLES'); } Feedback.reportScreenDimensions(); Feedback.reportLanguage(); }; var initFeedback = function (feedback) { // Initialize feedback Feedback.init(feedback); provideFeedback(); }; var onStoreReady = function (data) { if (common.userHash) { var localToken = tryParsing(localStorage.getItem(Constants.tokenKey)); if (localToken === null) { // if that number hasn't been set to localStorage, do so. localStorage.setItem(Constants.tokenKey, data[Constants.tokenKey]); } } initFeedback(data.feedback); }; common.startAccountDeletion = function (data, cb) { // Logout other tabs LocalStore.logout(null, true); cb(); }; var lastPing = +new Date(); var onPing = function (data, cb) { lastPing = +new Date(); cb(); }; var timeout = false; common.onTimeoutEvent = Util.mkEvent(); var onTimeout = function (fromOuter) { var key = fromOuter ? "TIMEOUT_OUTER" : "TIMEOUT_KICK"; Feedback.send(key, true); timeout = true; common.onNetworkDisconnect.fire(); common.padRpc.onDisconnectEvent.fire(); common.onTimeoutEvent.fire(); }; Visible.onChange(function (visible) { if (!visible) { return; } var now = +new Date(); // If last ping is bigger than 2min, ping the worker if (now - lastPing > (2 * 60 * 1000)) { var to = setTimeout(function () { onTimeout(true); }, 5000); postMessage('PING', null, function () { clearTimeout(to); }); } }); var queries = { PING: onPing, TIMEOUT: onTimeout, REQUEST_LOGIN: requestLogin, UPDATE_METADATA: common.changeMetadata, UPDATE_TOKEN: function (data) { var localToken = tryParsing(localStorage.getItem(Constants.tokenKey)); if (localToken !== data.token) { requestLogin(); } }, // Store STORE_READY: onStoreReady, // Network NETWORK_DISCONNECT: common.onNetworkDisconnect.fire, NETWORK_RECONNECT: function (data) { require(['/api/config?' + (+new Date())], function (NewConfig) { var update = updateLocalVersion(NewConfig.requireConf && NewConfig.requireConf.urlArgs); if (update) { postMessage('DISCONNECT'); return; } common.onNetworkReconnect.fire(data); }); }, // OnlyOffice OO_EVENT: common.onlyoffice.onEvent.fire, // Cursor CURSOR_EVENT: common.cursor.onEvent.fire, // Mailbox MAILBOX_EVENT: common.mailbox.onEvent.fire, // Universal UNIVERSAL_EVENT: common.universal.onEvent.fire, // Pad PAD_READY: common.padRpc.onReadyEvent.fire, PAD_MESSAGE: common.padRpc.onMessageEvent.fire, PAD_JOIN: common.padRpc.onJoinEvent.fire, PAD_LEAVE: common.padRpc.onLeaveEvent.fire, PAD_DISCONNECT: common.padRpc.onDisconnectEvent.fire, PAD_CACHE: common.padRpc.onCacheEvent.fire, PAD_CACHE_READY: common.padRpc.onCacheReadyEvent.fire, PAD_CONNECT: common.padRpc.onConnectEvent.fire, PAD_ERROR: common.padRpc.onErrorEvent.fire, PAD_METADATA: common.padRpc.onMetadataEvent.fire, CHANNEL_DELETED: common.padRpc.onChannelDeleted.fire, // Drive DRIVE_LOG: common.drive.onLog.fire, DRIVE_CHANGE: common.drive.onChange.fire, DRIVE_REMOVE: common.drive.onRemove.fire, // Account deletion DELETE_ACCOUNT: common.startAccountDeletion, // Loading LOADING_DRIVE: common.loading.onDriveEvent.fire, // AutoStore AUTOSTORE_DISPLAY_POPUP: common.autoStore.onStoreRequest.fire, }; common.hasCSSVariables = function () { if (window.CSS && window.CSS.supports && window.CSS.supports('--a', 0)) { return true; } // Safari lol y u always b returnin false ? var color = 'rgb(255, 198, 0)'; var el = document.createElement('span'); el.style.setProperty('--color', color); el.style.setProperty('background', 'var(--color)'); document.body.appendChild(el); var styles = getComputedStyle(el); var doesSupport = (styles.backgroundColor === color); document.body.removeChild(el); return doesSupport; }; common.isWebRTCSupported = function () { return Boolean(navigator.getUserMedia || navigator.webkitGetUserMedia || navigator.mozGetUserMedia || navigator.msGetUserMedia || window.RTCPeerConnection); }; common.ready = (function () { var env = {}; var initialized = false; return function (f, rdyCfg) { rdyCfg = rdyCfg || {}; if (rdyCfg.currentPad) { currentPad = common.currentPad = rdyCfg.currentPad; } if (initialized) { return void setTimeout(function () { f(void 0, env); }); } var userHash; (function iOSFirefoxFix () { /* For some bizarre reason Firefox on iOS throws an error during the loading process unless we call this function. Drawing these elements to the DOM presumably causes the JS engine to wait just a little bit longer until some APIs we need are ready. This occurs despite all this code being run after the usual dom-ready events. This fix was discovered while trying to log the error messages to the DOM because it's extremely difficult to debug Firefox iOS in the usual ways. In summary, computers are terrible. */ try { var style = document.createElement('style'); style.type = 'text/css'; style.appendChild(document.createTextNode('#cp-logger { display: none; }')); document.head.appendChild(style); var logger = document.createElement('div'); logger.setAttribute('id', 'cp-logger'); document.body.appendChild(logger); var pre = document.createElement('pre'); pre.innerText = 'x'; logger.appendChild(pre); } catch (err) { console.error(err); } }()); Nthen(function (waitFor) { if (AppConfig.beforeLogin) { AppConfig.beforeLogin(LocalStore.isLoggedIn(), waitFor()); } }).nThen(function (waitFor) { var blockHash = LocalStore.getBlockHash(); if (blockHash) { console.debug("Block hash is present"); var parsed = Block.parseBlockHash(blockHash); if (typeof(parsed) !== 'object') { console.error("Failed to parse blockHash"); console.log(parsed); return; } else { //console.log(parsed); } Util.fetch(parsed.href, waitFor(function (err, arraybuffer) { if (err) { return void console.log(err); } // use the results to load your user hash and // put your userhash into localStorage try { var block_info = Block.decrypt(arraybuffer, parsed.keys); if (!block_info) { console.error("Failed to decrypt !"); return; } userHash = block_info[Constants.userHashKey]; if (!userHash || userHash !== LocalStore.getUserHash()) { return void requestLogin(); } } catch (e) { console.error(e); return void console.error("failed to decrypt or decode block content"); } })); } }).nThen(function (waitFor) { var cfg = { init: true, userHash: userHash || LocalStore.getUserHash(), anonHash: LocalStore.getFSHash(), localToken: tryParsing(localStorage.getItem(Constants.tokenKey)), // TODO move this to LocalStore ? language: common.getLanguage(), cache: rdyCfg.cache, driveEvents: true //rdyCfg.driveEvents // Boolean }; common.userHash = userHash; // FIXME Backward compatibility if (sessionStorage.newPadFileData) { common.fromFileData = JSON.parse(sessionStorage.newPadFileData); var _parsed1 = Hash.parsePadUrl(common.fromFileData.href); var _parsed2 = Hash.parsePadUrl(window.location.href); if (_parsed1.hashData.type === 'pad') { if (_parsed1.type !== _parsed2.type) { delete common.fromFileData; } } delete sessionStorage.newPadFileData; } if (sessionStorage.newPadPath) { common.initialPath = sessionStorage.newPadPath; delete sessionStorage.newPadPath; } if (sessionStorage.newPadTeam) { common.initialTeam = sessionStorage.newPadTeam; delete sessionStorage.newPadTeam; } var channelIsReady = waitFor(); var msgEv = Util.mkEvent(); var postMsg, worker; var noWorker = AppConfig.disableWorkers || false; var noSharedWorker = false; if (localStorage.CryptPad_noWorkers) { noWorker = localStorage.CryptPad_noWorkers === '1'; console.error('WebWorker/SharedWorker state forced to ' + !noWorker); } Nthen(function (waitFor2) { if (Worker) { var w = waitFor2(); try { worker = new Worker('/common/outer/testworker.js?' + urlArgs); worker.onerror = function (errEv) { errEv.preventDefault(); errEv.stopPropagation(); noWorker = true; worker.terminate(); w(); }; worker.onmessage = function (ev) { if (ev.data === "OK") { worker.terminate(); w(); } }; } catch (e) { noWorker = true; w(); } } if (typeof(SharedWorker) !== "undefined") { try { new SharedWorker(''); } catch (e) { noSharedWorker = true; console.log('Disabling SharedWorker because of privacy settings.'); } } }).nThen(function (waitFor2) { if (!noWorker && !noSharedWorker && typeof(SharedWorker) !== "undefined") { worker = new SharedWorker('/common/outer/sharedworker.js?' + urlArgs); worker.onerror = function (e) { console.error(e.message); // FIXME seeing lots of errors here as of 2.20.0 }; worker.port.onmessage = function (ev) { if (ev.data === "SW_READY") { return; } msgEv.fire(ev); }; postMsg = function (data) { worker.port.postMessage(data); }; postMsg('INIT'); window.addEventListener('beforeunload', function () { postMsg('CLOSE'); }); } else if (false && !noWorker && !noSharedWorker && 'serviceWorker' in navigator) { var initializing = true; var stopWaiting = waitFor2(); // Call this function when we're ready postMsg = function (data) { if (worker) { return void worker.postMessage(data); } }; navigator.serviceWorker.register('/common/outer/serviceworker.js?' + urlArgs, {scope: '/'}) .then(function(reg) { // Add handler for receiving messages from the service worker navigator.serviceWorker.addEventListener('message', function (ev) { if (initializing && ev.data === "SW_READY") { initializing = false; } else { msgEv.fire(ev); } }); // Initialize the worker // If it is active (probably running in another tab), just post INIT if (reg.active) { worker = reg.active; postMsg("INIT"); } // If it was not active, wait for the "activated" state and post INIT reg.onupdatefound = function () { if (initializing) { var w = reg.installing; var onStateChange = function () { if (w.state === "activated") { worker = w; postMsg("INIT"); w.removeEventListener("statechange", onStateChange); } }; w.addEventListener('statechange', onStateChange); return; } // New version detected (from another tab): kill? console.error('New version detected: ABORT?'); }; return void stopWaiting(); }).catch(function(error) { /**/console.log('Registration failed with ' + error); }); window.addEventListener('beforeunload', function () { postMsg('CLOSE'); }); } else if (!noWorker && Worker) { worker = new Worker('/common/outer/webworker.js?' + urlArgs); worker.onerror = function (e) { console.error(e.message); }; worker.onmessage = function (ev) { msgEv.fire(ev); }; postMsg = function (data) { worker.postMessage(data); }; } else { // Use the async store in the main thread if workers are not available require(['/common/outer/noworker.js'], waitFor2(function (NoWorker) { NoWorker.onMessage(function (data) { msgEv.fire({data: data}); }); postMsg = function (d) { setTimeout(function () { NoWorker.query(d); }); }; NoWorker.create(); })); } }).nThen(function () { Channel.create(msgEv, postMsg, function (chan) { console.log('Outer ready'); Object.keys(queries).forEach(function (q) { chan.on(q, function (data, cb) { if (timeout) { return; } try { queries[q](data, cb); } catch (e) { console.error("Error in outer when executing query " + q); console.error(e); console.log(data); } }); }); postMessage = function (cmd, data, cb, opts) { cb = cb || function () {}; if (timeout) { return void cb ({error: 'TIMEOUT'}); } chan.query(cmd, data, function (err, data) { if (err) { return void cb ({error: err}); } cb(data); }, opts); }; console.log('Posting CONNECT'); postMessage('CONNECT', cfg, function (data) { // FIXME data should always exist // this indicates a false condition in sharedWorker // got here via a reference error: // uncaught exception: TypeError: data is undefined if (!data) { throw new Error('FALSE_INIT'); } if (data.error) { throw new Error(data.error); } if (data.state === 'ALREADY_INIT') { data = data.returned; } if (data.anonHash && !cfg.userHash) { LocalStore.setFSHash(data.anonHash); } initialized = true; channelIsReady(); }); }, false); }); }).nThen(function () { // Load the new pad when the hash has changed var oldHref = document.location.href; window.onhashchange = function (ev) { if (ev && ev.reset) { oldHref = document.location.href; return; } var newHref = document.location.href; // Compare the URLs without /embed and /present var parsedOld = Hash.parsePadUrl(oldHref); var parsedNew = Hash.parsePadUrl(newHref); if (parsedOld.hashData && parsedNew.hashData && parsedOld.getUrl() !== parsedNew.getUrl()) { if (parsedOld.hashData.version !== 3 && !parsedOld.hashData.key) { oldHref = newHref; return; } // If different, reload document.location.reload(); return; } if (parsedNew.hashData) { oldHref = newHref; } }; // Listen for login/logout in other tabs window.addEventListener('storage', function (e) { if (e.key !== Constants.userHashKey) { return; } var o = e.oldValue; var n = e.newValue; if (!o && n) { LocalStore.loginReload(); } else if (o && !n) { LocalStore.logout(); } }); LocalStore.onLogout(function () { console.log('onLogout: disconnect'); postMessage("DISCONNECT"); }); }).nThen(function (waitFor) { if (common.createReadme || sessionStorage.createReadme) { var data = { driveReadme: Messages.driveReadme, driveReadmeTitle: Messages.driveReadmeTitle, }; postMessage("CREATE_README", data, waitFor(function (e) { if (e && e.error) { return void console.error(e.error); } })); } }).nThen(function (waitFor) { if (common.migrateAnonDrive || sessionStorage.migrateAnonDrive) { common.mergeAnonDrive(waitFor()); } }).nThen(function (waitFor) { if (AppConfig.afterLogin) { AppConfig.afterLogin(common, waitFor()); } }).nThen(function () { updateLocalVersion(); f(void 0, env); if (typeof(window.onhashchange) === 'function') { window.onhashchange(); } }); }; }()); return common; });