|
|
// Load #1, load as little as possible because we are in a race to get the loading screen up.
|
|
|
define([
|
|
|
'/bower_components/nthen/index.js',
|
|
|
'/api/config',
|
|
|
'/common/dom-ready.js',
|
|
|
'/common/sframe-common-outer.js',
|
|
|
], function (nThen, ApiConfig, DomReady, SFCommonO) {
|
|
|
|
|
|
// Loaded in load #2
|
|
|
var hash, href;
|
|
|
nThen(function (waitFor) {
|
|
|
DomReady.onReady(waitFor());
|
|
|
}).nThen(function (waitFor) {
|
|
|
var obj = SFCommonO.initIframe(waitFor, true);
|
|
|
href = obj.href;
|
|
|
hash = obj.hash;
|
|
|
}).nThen(function (/*waitFor*/) {
|
|
|
var afterSecrets = function (Cryptpad, Utils, secret, cb, sframeChan) {
|
|
|
var parsed = Utils.Hash.parsePadUrl(href);
|
|
|
var isSf = parsed.hashData && parsed.hashData.type === 'pad';
|
|
|
if (!isSf) { return void cb(); }
|
|
|
|
|
|
// SF and logged in: add shared folder
|
|
|
if (Utils.LocalStore.isLoggedIn()) {
|
|
|
Cryptpad.addSharedFolder(null, secret, function (id) {
|
|
|
if (id && typeof(id) === "object" && id.error) {
|
|
|
sframeChan.event("EV_RESTRICTED_ERROR");
|
|
|
return;
|
|
|
}
|
|
|
|
|
|
window.CryptPad_newSharedFolder = id;
|
|
|
|
|
|
// Clear the hash now that the secrets have been generated
|
|
|
if (window.history && window.history.replaceState && hash) {
|
|
|
window.history.replaceState({}, window.document.title, '#');
|
|
|
}
|
|
|
|
|
|
cb();
|
|
|
});
|
|
|
return;
|
|
|
}
|
|
|
|
|
|
// Anon shared folder
|
|
|
var id = Utils.Util.createRandomInteger();
|
|
|
window.CryptPad_newSharedFolder = id;
|
|
|
var data = {
|
|
|
href: Utils.Hash.getRelativeHref(Cryptpad.currentPad.href),
|
|
|
password: secret.password
|
|
|
};
|
|
|
Cryptpad.loadSharedFolder(id, data, cb);
|
|
|
};
|
|
|
var addRpc = function (sframeChan, Cryptpad, Utils) {
|
|
|
sframeChan.on('EV_BURN_ANON_DRIVE', function () {
|
|
|
if (Utils.LocalStore.isLoggedIn()) { return; }
|
|
|
Utils.LocalStore.setFSHash('');
|
|
|
Utils.LocalStore.clearThumbnail();
|
|
|
try {
|
|
|
Utils.Cache.clear(function () {
|
|
|
window.location.reload();
|
|
|
});
|
|
|
} catch (e) {
|
|
|
window.location.reload();
|
|
|
}
|
|
|
});
|
|
|
sframeChan.on('Q_DRIVE_USEROBJECT', function (data, cb) {
|
|
|
Cryptpad.userObjectCommand(data, cb);
|
|
|
});
|
|
|
sframeChan.on('Q_DRIVE_RESTORE', function (data, cb) {
|
|
|
Cryptpad.restoreDrive(data, cb);
|
|
|
});
|
|
|
sframeChan.on('Q_DRIVE_GETOBJECT', function (data, cb) {
|
|
|
if (data && data.sharedFolder) {
|
|
|
Cryptpad.getSharedFolder({
|
|
|
id: data.sharedFolder
|
|
|
}, function (obj) {
|
|
|
cb(obj);
|
|
|
});
|
|
|
return;
|
|
|
}
|
|
|
Cryptpad.getUserObject(null, function (obj) {
|
|
|
cb(obj);
|
|
|
});
|
|
|
});
|
|
|
Cryptpad.onNetworkDisconnect.reg(function () {
|
|
|
sframeChan.event('EV_NETWORK_DISCONNECT');
|
|
|
});
|
|
|
Cryptpad.onNetworkReconnect.reg(function () {
|
|
|
sframeChan.event('EV_NETWORK_RECONNECT');
|
|
|
});
|
|
|
Cryptpad.drive.onLog.reg(function (msg) {
|
|
|
sframeChan.event('EV_DRIVE_LOG', msg);
|
|
|
});
|
|
|
Cryptpad.drive.onChange.reg(function (data) {
|
|
|
sframeChan.event('EV_DRIVE_CHANGE', data);
|
|
|
});
|
|
|
Cryptpad.drive.onRemove.reg(function (data) {
|
|
|
sframeChan.event('EV_DRIVE_REMOVE', data);
|
|
|
});
|
|
|
};
|
|
|
var addData = function (meta, Cryptpad) {
|
|
|
if (!window.CryptPad_newSharedFolder) { return; }
|
|
|
meta.anonSFHref = Cryptpad.currentPad.href;
|
|
|
};
|
|
|
SFCommonO.start({
|
|
|
hash: hash,
|
|
|
href: href,
|
|
|
afterSecrets: afterSecrets,
|
|
|
noHash: true,
|
|
|
noRealtime: true,
|
|
|
driveEvents: true,
|
|
|
addRpc: addRpc,
|
|
|
addData: addData,
|
|
|
isDrive: true,
|
|
|
});
|
|
|
});
|
|
|
});
|