aboutsummaryrefslogtreecommitdiffstats
path: root/apps/federatedfilesharing/src/external.js
blob: 68cc958b7b55d1a83fae106c79eda4c454ddca2f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
/**
 * SPDX-FileCopyrightText: 2016-2024 Nextcloud GmbH and Nextcloud contributors
 * SPDX-FileCopyrightText: 2014-2016 ownCloud, Inc.
 * SPDX-License-Identifier: AGPL-3.0-or-later
 */
import axios, { isAxiosError } from '@nextcloud/axios'
import { showError, showInfo } from '@nextcloud/dialogs'
import { subscribe } from '@nextcloud/event-bus'
import { loadState } from '@nextcloud/initial-state'
import { t } from '@nextcloud/l10n'
import { generateUrl } from '@nextcloud/router'
import { showRemoteShareDialog } from './services/dialogService.ts'
import logger from './services/logger.ts'

window.OCA.Sharing = window.OCA.Sharing ?? {}

/**
 * Shows "add external share" dialog.
 *
 * @param {object} share the share
 * @param {string} share.remote remote server URL
 * @param {string} share.owner owner name
 * @param {string} share.name name of the shared folder
 * @param {string} share.token authentication token
 * @param {boolean} passwordProtected true if the share is password protected
 * @param {Function} callback the callback
 */
window.OCA.Sharing.showAddExternalDialog = function(share, passwordProtected, callback) {
	const owner = share.ownerDisplayName || share.owner
	const name = share.name

	// Clean up the remote URL for display
	const remote = share.remote
		.replace(/^https?:\/\//, '') // remove http:// or https://
		.replace(/\/$/, '') // remove trailing slash

	showRemoteShareDialog(name, owner, remote, passwordProtected)
		.then((result, password) => callback(result, { ...share, password }))
		// eslint-disable-next-line n/no-callback-literal
		.catch(() => callback(false, share))
}

window.addEventListener('DOMContentLoaded', () => {
	processIncomingShareFromUrl()

	if (loadState('federatedfilesharing', 'notificationsEnabled', true) !== true) {
		// No notification app, display the modal
		processSharesToConfirm()
	}

	subscribe('notifications:action:executed', ({ action, notification }) => {
		if (notification.app === 'files_sharing' && notification.object_type === 'remote_share' && action.type === 'POST') {
			// User accepted a remote share reload
			reloadFilesList()
		}
	})
})

/**
 * Reload the files list to show accepted shares
 */
function reloadFilesList() {
	if (!window?.OCP?.Files?.Router?.goToRoute) {
		// No router, just reload the page
		window.location.reload()
		return
	}

	// Let's redirect to the root as any accepted share would be there
	window.OCP.Files.Router.goToRoute(
		null,
		{ ...window.OCP.Files.Router.params, fileid: undefined },
		{ ...window.OCP.Files.Router.query, dir: '/', openfile: undefined },
	)
}

/**
 * Process incoming remote share that might have been passed
 * through the URL
 */
function processIncomingShareFromUrl() {
	const params = window.OC.Util.History.parseUrlQuery()

	// manually add server-to-server share
	if (params.remote && params.token && params.name) {

		const callbackAddShare = (result, share) => {
			if (result === false) {
				return
			}

			axios.post(
				generateUrl('apps/federatedfilesharing/askForFederatedShare'),
				{
					remote: share.remote,
					token: share.token,
					owner: share.owner,
					ownerDisplayName: share.ownerDisplayName || share.owner,
					name: share.name,
					password: share.password || '',
				},
			).then(({ data }) => {
				if (Object.hasOwn(data, 'legacyMount')) {
					reloadFilesList()
				} else {
					showInfo(data.message)
				}
			}).catch((error) => {
				logger.error('Error while processing incoming share', { error })

				if (isAxiosError(error) && error.response.data.message) {
					showError(error.response.data.message)
				} else {
					showError(t('federatedfilesharing', 'Incoming share could not be processed'))
				}
			})
		}

		// clear hash, it is unlikely that it contain any extra parameters
		location.hash = ''
		params.passwordProtected = parseInt(params.protected, 10) === 1
		window.OCA.Sharing.showAddExternalDialog(
			params,
			params.passwordProtected,
			callbackAddShare,
		)
	}
}

/**
 * Retrieve a list of remote shares that need to be approved
 */
async function processSharesToConfirm() {
	// check for new server-to-server shares which need to be approved
	const { data: shares } = await axios.get(generateUrl('/apps/files_sharing/api/externalShares'))
	for (let index = 0; index < shares.length; ++index) {
		window.OCA.Sharing.showAddExternalDialog(
			shares[index],
			false,
			function(result, share) {
				if (result === false) {
					// Delete
					axios.delete(generateUrl('/apps/files_sharing/api/externalShares/' + share.id))
				} else {
					// Accept
					axios.post(generateUrl('/apps/files_sharing/api/externalShares'), { id: share.id })
						.then(() => reloadFilesList())
				}
			},
		)
	}
}