2014-10-31 13:41:07 +03:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2014
|
|
|
|
*
|
|
|
|
* This file is licensed under the Affero General Public License version 3
|
|
|
|
* or later.
|
|
|
|
*
|
|
|
|
* See the COPYING-README file.
|
|
|
|
*
|
|
|
|
*/
|
2015-03-16 16:07:53 +03:00
|
|
|
|
2013-10-10 13:10:32 +04:00
|
|
|
(function(){
|
|
|
|
|
2015-03-16 16:07:53 +03:00
|
|
|
// TODO: move to a separate file
|
|
|
|
var MOUNT_OPTIONS_DROPDOWN_TEMPLATE =
|
|
|
|
'<div class="drop dropdown mountOptionsDropdown">' +
|
|
|
|
// FIXME: options are hard-coded for now
|
|
|
|
' <div class="optionRow">' +
|
2015-03-31 17:25:33 +03:00
|
|
|
' <input id="mountOptionsEncrypt" name="encrypt" type="checkbox" value="true" checked="checked"/>' +
|
2015-09-17 18:39:27 +03:00
|
|
|
' <label for="mountOptionsEncrypt">{{t "files_external" "Enable encryption"}}</label>' +
|
2015-03-31 17:25:33 +03:00
|
|
|
' </div>' +
|
|
|
|
' <div class="optionRow">' +
|
2015-03-16 16:07:53 +03:00
|
|
|
' <input id="mountOptionsPreviews" name="previews" type="checkbox" value="true" checked="checked"/>' +
|
2015-09-17 18:39:27 +03:00
|
|
|
' <label for="mountOptionsPreviews">{{t "files_external" "Enable previews"}}</label>' +
|
2015-03-16 16:07:53 +03:00
|
|
|
' </div>' +
|
|
|
|
' <div class="optionRow">' +
|
2015-12-02 18:23:50 +03:00
|
|
|
' <input id="mountOptionsSharing" name="enable_sharing" type="checkbox" value="true" checked="checked"/>' +
|
|
|
|
' <label for="mountOptionsSharing">{{t "files_external" "Enable sharing"}}</label>' +
|
|
|
|
' </div>' +
|
|
|
|
' <div class="optionRow">' +
|
2015-03-16 16:07:53 +03:00
|
|
|
' <label for="mountOptionsFilesystemCheck">{{t "files_external" "Check for changes"}}</label>' +
|
|
|
|
' <select id="mountOptionsFilesystemCheck" name="filesystem_check_changes" data-type="int">' +
|
|
|
|
' <option value="0">{{t "files_external" "Never"}}</option>' +
|
|
|
|
' <option value="1" selected="selected">{{t "files_external" "Once every direct access"}}</option>' +
|
|
|
|
' </select>' +
|
|
|
|
' </div>' +
|
|
|
|
'</div>';
|
|
|
|
|
2015-05-30 15:00:52 +03:00
|
|
|
/* TODO the current l10n extrator can't handle JS functions within handlebar
|
|
|
|
templates therefore they are duplicated here
|
|
|
|
t("files_external", "Enable encryption")
|
|
|
|
t("files_external", "Enable previews")
|
2015-12-02 18:23:50 +03:00
|
|
|
t("files_external", "Enable sharing")
|
2015-05-30 15:00:52 +03:00
|
|
|
t("files_external", "Check for changes")
|
|
|
|
t("files_external", "Never")
|
|
|
|
t("files_external", "Once every direct access")
|
|
|
|
*/
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* Returns the selection of applicable users in the given configuration row
|
|
|
|
*
|
|
|
|
* @param $row configuration row
|
|
|
|
* @return array array of user names
|
|
|
|
*/
|
2014-08-21 17:11:21 +04:00
|
|
|
function getSelection($row) {
|
|
|
|
var values = $row.find('.applicableUsers').select2('val');
|
|
|
|
if (!values || values.length === 0) {
|
2014-10-31 13:41:07 +03:00
|
|
|
values = [];
|
2014-08-21 17:11:21 +04:00
|
|
|
}
|
|
|
|
return values;
|
|
|
|
}
|
|
|
|
|
2014-10-13 20:40:57 +04:00
|
|
|
function highlightBorder($element, highlight) {
|
|
|
|
$element.toggleClass('warning-input', highlight);
|
2014-08-14 20:48:34 +04:00
|
|
|
return highlight;
|
|
|
|
}
|
|
|
|
|
2016-01-26 20:25:59 +03:00
|
|
|
function isInputValid($input) {
|
|
|
|
var optional = $input.hasClass('optional');
|
|
|
|
switch ($input.attr('type')) {
|
|
|
|
case 'text':
|
|
|
|
case 'password':
|
|
|
|
if ($input.val() === '' && !optional) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2014-10-13 20:40:57 +04:00
|
|
|
function highlightInput($input) {
|
2016-01-26 20:25:59 +03:00
|
|
|
switch ($input.attr('type')) {
|
|
|
|
case 'text':
|
|
|
|
case 'password':
|
|
|
|
return highlightBorder($input, !isInputValid($input));
|
2014-08-14 20:48:34 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* Initialize select2 plugin on the given elements
|
|
|
|
*
|
|
|
|
* @param {Array<Object>} array of jQuery elements
|
|
|
|
* @param {int} userListLimit page size for result list
|
|
|
|
*/
|
|
|
|
function addSelect2 ($elements, userListLimit) {
|
|
|
|
if (!$elements.length) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
$elements.select2({
|
|
|
|
placeholder: t('files_external', 'All users. Type to select user or group.'),
|
|
|
|
allowClear: true,
|
|
|
|
multiple: true,
|
|
|
|
//minimumInputLength: 1,
|
|
|
|
ajax: {
|
|
|
|
url: OC.generateUrl('apps/files_external/applicable'),
|
|
|
|
dataType: 'json',
|
|
|
|
quietMillis: 100,
|
|
|
|
data: function (term, page) { // page is the one-based page number tracked by Select2
|
|
|
|
return {
|
|
|
|
pattern: term, //search term
|
|
|
|
limit: userListLimit, // page size
|
|
|
|
offset: userListLimit*(page-1) // page number starts with 0
|
|
|
|
};
|
|
|
|
},
|
|
|
|
results: function (data) {
|
|
|
|
if (data.status === 'success') {
|
|
|
|
|
|
|
|
var results = [];
|
|
|
|
var userCount = 0; // users is an object
|
|
|
|
|
|
|
|
// add groups
|
|
|
|
$.each(data.groups, function(i, group) {
|
|
|
|
results.push({name:group+'(group)', displayname:group, type:'group' });
|
|
|
|
});
|
|
|
|
// add users
|
|
|
|
$.each(data.users, function(id, user) {
|
|
|
|
userCount++;
|
|
|
|
results.push({name:id, displayname:user, type:'user' });
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
var more = (userCount >= userListLimit) || (data.groups.length >= userListLimit);
|
|
|
|
return {results: results, more: more};
|
2012-06-08 19:42:00 +04:00
|
|
|
} else {
|
2014-10-31 13:41:07 +03:00
|
|
|
//FIXME add error handling
|
2012-06-08 19:42:00 +04:00
|
|
|
}
|
|
|
|
}
|
2014-10-31 13:41:07 +03:00
|
|
|
},
|
|
|
|
initSelection: function(element, callback) {
|
|
|
|
var users = {};
|
|
|
|
users['users'] = [];
|
|
|
|
var toSplit = element.val().split(",");
|
|
|
|
for (var i = 0; i < toSplit.length; i++) {
|
|
|
|
users['users'].push(toSplit[i]);
|
|
|
|
}
|
|
|
|
|
|
|
|
$.ajax(OC.generateUrl('displaynames'), {
|
|
|
|
type: 'POST',
|
|
|
|
contentType: 'application/json',
|
|
|
|
data: JSON.stringify(users),
|
|
|
|
dataType: 'json'
|
|
|
|
}).done(function(data) {
|
|
|
|
var results = [];
|
|
|
|
if (data.status === 'success') {
|
|
|
|
$.each(data.users, function(user, displayname) {
|
|
|
|
if (displayname !== false) {
|
|
|
|
results.push({name:user, displayname:displayname, type:'user'});
|
2013-10-10 13:10:32 +04:00
|
|
|
}
|
2013-01-02 01:19:40 +04:00
|
|
|
});
|
2014-10-31 13:41:07 +03:00
|
|
|
callback(results);
|
|
|
|
} else {
|
|
|
|
//FIXME add error handling
|
|
|
|
}
|
|
|
|
});
|
|
|
|
},
|
|
|
|
id: function(element) {
|
|
|
|
return element.name;
|
|
|
|
},
|
|
|
|
formatResult: function (element) {
|
|
|
|
var $result = $('<span><div class="avatardiv"/><span>'+escapeHTML(element.displayname)+'</span></span>');
|
|
|
|
var $div = $result.find('.avatardiv')
|
|
|
|
.attr('data-type', element.type)
|
|
|
|
.attr('data-name', element.name)
|
|
|
|
.attr('data-displayname', element.displayname);
|
|
|
|
if (element.type === 'group') {
|
|
|
|
var url = OC.imagePath('core','places/contacts-dark'); // TODO better group icon
|
|
|
|
$div.html('<img width="32" height="32" src="'+url+'">');
|
|
|
|
}
|
|
|
|
return $result.get(0).outerHTML;
|
|
|
|
},
|
|
|
|
formatSelection: function (element) {
|
|
|
|
if (element.type === 'group') {
|
|
|
|
return '<span title="'+escapeHTML(element.name)+'" class="group">'+escapeHTML(element.displayname+' '+t('files_external', '(group)'))+'</span>';
|
2012-06-08 19:42:00 +04:00
|
|
|
} else {
|
2014-10-31 13:41:07 +03:00
|
|
|
return '<span title="'+escapeHTML(element.name)+'" class="user">'+escapeHTML(element.displayname)+'</span>';
|
2012-06-08 19:42:00 +04:00
|
|
|
}
|
2014-10-31 13:41:07 +03:00
|
|
|
},
|
|
|
|
escapeMarkup: function (m) { return m; } // we escape the markup in formatResult and formatSelection
|
|
|
|
}).on('select2-loaded', function() {
|
|
|
|
$.each($('.avatardiv'), function(i, div) {
|
|
|
|
var $div = $(div);
|
|
|
|
if ($div.data('type') === 'user') {
|
|
|
|
$div.avatar($div.data('name'),32);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @class OCA.External.Settings.StorageConfig
|
|
|
|
*
|
|
|
|
* @classdesc External storage config
|
|
|
|
*/
|
|
|
|
var StorageConfig = function(id) {
|
|
|
|
this.id = id;
|
|
|
|
this.backendOptions = {};
|
|
|
|
};
|
|
|
|
// Keep this in sync with \OC_Mount_Config::STATUS_*
|
|
|
|
StorageConfig.Status = {
|
|
|
|
IN_PROGRESS: -1,
|
|
|
|
SUCCESS: 0,
|
2015-08-12 21:51:09 +03:00
|
|
|
ERROR: 1,
|
|
|
|
INDETERMINATE: 2
|
2012-09-06 00:17:33 +04:00
|
|
|
};
|
2016-01-26 15:22:27 +03:00
|
|
|
StorageConfig.Visibility = {
|
|
|
|
NONE: 0,
|
|
|
|
PERSONAL: 1,
|
|
|
|
ADMIN: 2,
|
|
|
|
DEFAULT: 3
|
|
|
|
};
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* @memberof OCA.External.Settings
|
|
|
|
*/
|
|
|
|
StorageConfig.prototype = {
|
|
|
|
_url: null,
|
2012-06-12 19:36:25 +04:00
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* Storage id
|
|
|
|
*
|
|
|
|
* @type int
|
|
|
|
*/
|
|
|
|
id: null,
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Mount point
|
|
|
|
*
|
|
|
|
* @type string
|
|
|
|
*/
|
|
|
|
mountPoint: '',
|
|
|
|
|
|
|
|
/**
|
2015-08-12 22:03:11 +03:00
|
|
|
* Backend
|
2014-10-31 13:41:07 +03:00
|
|
|
*
|
|
|
|
* @type string
|
|
|
|
*/
|
2015-08-12 22:03:11 +03:00
|
|
|
backend: null,
|
2014-10-31 13:41:07 +03:00
|
|
|
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
/**
|
2015-08-12 22:03:11 +03:00
|
|
|
* Authentication mechanism
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
*
|
|
|
|
* @type string
|
|
|
|
*/
|
2015-08-12 22:03:11 +03:00
|
|
|
authMechanism: null,
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* Backend-specific configuration
|
|
|
|
*
|
|
|
|
* @type Object.<string,object>
|
|
|
|
*/
|
|
|
|
backendOptions: null,
|
|
|
|
|
2015-03-13 14:49:11 +03:00
|
|
|
/**
|
|
|
|
* Mount-specific options
|
|
|
|
*
|
|
|
|
* @type Object.<string,object>
|
|
|
|
*/
|
|
|
|
mountOptions: null,
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* Creates or saves the storage.
|
|
|
|
*
|
|
|
|
* @param {Function} [options.success] success callback, receives result as argument
|
|
|
|
* @param {Function} [options.error] error callback
|
|
|
|
*/
|
|
|
|
save: function(options) {
|
|
|
|
var self = this;
|
|
|
|
var url = OC.generateUrl(this._url);
|
|
|
|
var method = 'POST';
|
|
|
|
if (_.isNumber(this.id)) {
|
|
|
|
method = 'PUT';
|
|
|
|
url = OC.generateUrl(this._url + '/{id}', {id: this.id});
|
|
|
|
}
|
|
|
|
|
|
|
|
$.ajax({
|
|
|
|
type: method,
|
|
|
|
url: url,
|
2015-03-16 16:07:53 +03:00
|
|
|
contentType: 'application/json',
|
|
|
|
data: JSON.stringify(this.getData()),
|
2014-10-31 13:41:07 +03:00
|
|
|
success: function(result) {
|
|
|
|
self.id = result.id;
|
|
|
|
if (_.isFunction(options.success)) {
|
|
|
|
options.success(result);
|
|
|
|
}
|
|
|
|
},
|
|
|
|
error: options.error
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the data from this object
|
|
|
|
*
|
|
|
|
* @return {Array} JSON array of the data
|
|
|
|
*/
|
|
|
|
getData: function() {
|
|
|
|
var data = {
|
|
|
|
mountPoint: this.mountPoint,
|
2015-08-12 22:03:11 +03:00
|
|
|
backend: this.backend,
|
|
|
|
authMechanism: this.authMechanism,
|
2014-10-31 13:41:07 +03:00
|
|
|
backendOptions: this.backendOptions
|
|
|
|
};
|
|
|
|
if (this.id) {
|
|
|
|
data.id = this.id;
|
|
|
|
}
|
2015-03-13 14:49:11 +03:00
|
|
|
if (this.mountOptions) {
|
|
|
|
data.mountOptions = this.mountOptions;
|
|
|
|
}
|
2014-10-31 13:41:07 +03:00
|
|
|
return data;
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Recheck the storage
|
|
|
|
*
|
|
|
|
* @param {Function} [options.success] success callback, receives result as argument
|
|
|
|
* @param {Function} [options.error] error callback
|
|
|
|
*/
|
|
|
|
recheck: function(options) {
|
|
|
|
if (!_.isNumber(this.id)) {
|
|
|
|
if (_.isFunction(options.error)) {
|
|
|
|
options.error();
|
2014-05-08 17:25:46 +04:00
|
|
|
}
|
2014-10-31 13:41:07 +03:00
|
|
|
return;
|
2014-05-08 17:25:46 +04:00
|
|
|
}
|
2014-10-31 13:41:07 +03:00
|
|
|
$.ajax({
|
|
|
|
type: 'GET',
|
|
|
|
url: OC.generateUrl(this._url + '/{id}', {id: this.id}),
|
|
|
|
success: options.success,
|
|
|
|
error: options.error
|
|
|
|
});
|
|
|
|
},
|
2014-05-08 17:25:46 +04:00
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* Deletes the storage
|
|
|
|
*
|
|
|
|
* @param {Function} [options.success] success callback
|
|
|
|
* @param {Function} [options.error] error callback
|
|
|
|
*/
|
|
|
|
destroy: function(options) {
|
|
|
|
if (!_.isNumber(this.id)) {
|
|
|
|
// the storage hasn't even been created => success
|
|
|
|
if (_.isFunction(options.success)) {
|
|
|
|
options.success();
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
$.ajax({
|
|
|
|
type: 'DELETE',
|
|
|
|
url: OC.generateUrl(this._url + '/{id}', {id: this.id}),
|
|
|
|
success: options.success,
|
|
|
|
error: options.error
|
|
|
|
});
|
|
|
|
},
|
2014-08-22 20:16:55 +04:00
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* Validate this model
|
|
|
|
*
|
|
|
|
* @return {boolean} false if errors exist, true otherwise
|
|
|
|
*/
|
|
|
|
validate: function() {
|
|
|
|
if (this.mountPoint === '') {
|
|
|
|
return false;
|
|
|
|
}
|
2016-01-19 16:16:11 +03:00
|
|
|
if (!this.backend) {
|
|
|
|
return false;
|
|
|
|
}
|
2014-10-31 13:41:07 +03:00
|
|
|
if (this.errors) {
|
|
|
|
return false;
|
2014-05-08 17:25:46 +04:00
|
|
|
}
|
2014-10-31 13:41:07 +03:00
|
|
|
return true;
|
2014-05-08 17:25:46 +04:00
|
|
|
}
|
2014-10-31 13:41:07 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @class OCA.External.Settings.GlobalStorageConfig
|
|
|
|
* @augments OCA.External.Settings.StorageConfig
|
|
|
|
*
|
|
|
|
* @classdesc Global external storage config
|
|
|
|
*/
|
|
|
|
var GlobalStorageConfig = function(id) {
|
|
|
|
this.id = id;
|
|
|
|
this.applicableUsers = [];
|
|
|
|
this.applicableGroups = [];
|
|
|
|
};
|
|
|
|
/**
|
|
|
|
* @memberOf OCA.External.Settings
|
|
|
|
*/
|
|
|
|
GlobalStorageConfig.prototype = _.extend({}, StorageConfig.prototype,
|
|
|
|
/** @lends OCA.External.Settings.GlobalStorageConfig.prototype */ {
|
|
|
|
_url: 'apps/files_external/globalstorages',
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Applicable users
|
|
|
|
*
|
|
|
|
* @type Array.<string>
|
|
|
|
*/
|
|
|
|
applicableUsers: null,
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Applicable groups
|
|
|
|
*
|
|
|
|
* @type Array.<string>
|
|
|
|
*/
|
|
|
|
applicableGroups: null,
|
|
|
|
|
2015-03-12 19:27:31 +03:00
|
|
|
/**
|
|
|
|
* Storage priority
|
|
|
|
*
|
|
|
|
* @type int
|
|
|
|
*/
|
|
|
|
priority: null,
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* Returns the data from this object
|
|
|
|
*
|
|
|
|
* @return {Array} JSON array of the data
|
|
|
|
*/
|
|
|
|
getData: function() {
|
|
|
|
var data = StorageConfig.prototype.getData.apply(this, arguments);
|
|
|
|
return _.extend(data, {
|
|
|
|
applicableUsers: this.applicableUsers,
|
|
|
|
applicableGroups: this.applicableGroups,
|
2015-03-12 19:27:31 +03:00
|
|
|
priority: this.priority,
|
2014-10-31 13:41:07 +03:00
|
|
|
});
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @class OCA.External.Settings.UserStorageConfig
|
|
|
|
* @augments OCA.External.Settings.StorageConfig
|
|
|
|
*
|
|
|
|
* @classdesc User external storage config
|
|
|
|
*/
|
|
|
|
var UserStorageConfig = function(id) {
|
|
|
|
this.id = id;
|
|
|
|
};
|
|
|
|
UserStorageConfig.prototype = _.extend({}, StorageConfig.prototype,
|
|
|
|
/** @lends OCA.External.Settings.UserStorageConfig.prototype */ {
|
|
|
|
_url: 'apps/files_external/userstorages'
|
|
|
|
});
|
|
|
|
|
2016-01-19 16:16:11 +03:00
|
|
|
/**
|
|
|
|
* @class OCA.External.Settings.UserGlobalStorageConfig
|
|
|
|
* @augments OCA.External.Settings.StorageConfig
|
|
|
|
*
|
|
|
|
* @classdesc User external storage config
|
|
|
|
*/
|
|
|
|
var UserGlobalStorageConfig = function (id) {
|
|
|
|
this.id = id;
|
|
|
|
};
|
|
|
|
UserGlobalStorageConfig.prototype = _.extend({}, StorageConfig.prototype,
|
|
|
|
/** @lends OCA.External.Settings.UserStorageConfig.prototype */ {
|
|
|
|
|
2016-01-19 18:57:20 +03:00
|
|
|
_url: 'apps/files_external/userglobalstorages'
|
2016-01-19 16:16:11 +03:00
|
|
|
});
|
|
|
|
|
2015-03-16 16:07:53 +03:00
|
|
|
/**
|
|
|
|
* @class OCA.External.Settings.MountOptionsDropdown
|
|
|
|
*
|
|
|
|
* @classdesc Dropdown for mount options
|
|
|
|
*
|
|
|
|
* @param {Object} $container container DOM object
|
|
|
|
*/
|
|
|
|
var MountOptionsDropdown = function() {
|
|
|
|
};
|
|
|
|
/**
|
|
|
|
* @memberof OCA.External.Settings
|
|
|
|
*/
|
|
|
|
MountOptionsDropdown.prototype = {
|
|
|
|
/**
|
|
|
|
* Dropdown element
|
|
|
|
*
|
|
|
|
* @var Object
|
|
|
|
*/
|
|
|
|
$el: null,
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Show dropdown
|
|
|
|
*
|
|
|
|
* @param {Object} $container container
|
|
|
|
* @param {Object} mountOptions mount options
|
2015-03-31 17:25:33 +03:00
|
|
|
* @param {Array} enabledOptions enabled mount options
|
2015-03-16 16:07:53 +03:00
|
|
|
*/
|
2015-03-31 17:25:33 +03:00
|
|
|
show: function($container, mountOptions, enabledOptions) {
|
2015-03-16 16:07:53 +03:00
|
|
|
if (MountOptionsDropdown._last) {
|
|
|
|
MountOptionsDropdown._last.hide();
|
|
|
|
}
|
|
|
|
|
|
|
|
var template = MountOptionsDropdown._template;
|
|
|
|
if (!template) {
|
|
|
|
template = Handlebars.compile(MOUNT_OPTIONS_DROPDOWN_TEMPLATE);
|
|
|
|
MountOptionsDropdown._template = template;
|
|
|
|
}
|
|
|
|
|
|
|
|
var $el = $(template());
|
|
|
|
this.$el = $el;
|
|
|
|
|
2015-03-31 17:25:33 +03:00
|
|
|
this.setOptions(mountOptions, enabledOptions);
|
2015-03-16 16:07:53 +03:00
|
|
|
|
|
|
|
this.$el.appendTo($container);
|
|
|
|
MountOptionsDropdown._last = this;
|
|
|
|
|
|
|
|
this.$el.trigger('show');
|
|
|
|
},
|
|
|
|
|
|
|
|
hide: function() {
|
|
|
|
if (this.$el) {
|
|
|
|
this.$el.trigger('hide');
|
|
|
|
this.$el.remove();
|
|
|
|
this.$el = null;
|
|
|
|
MountOptionsDropdown._last = null;
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the mount options from the dropdown controls
|
|
|
|
*
|
|
|
|
* @return {Object} options mount options
|
|
|
|
*/
|
|
|
|
getOptions: function() {
|
|
|
|
var options = {};
|
|
|
|
|
|
|
|
this.$el.find('input, select').each(function() {
|
|
|
|
var $this = $(this);
|
|
|
|
var key = $this.attr('name');
|
|
|
|
var value = null;
|
|
|
|
if ($this.attr('type') === 'checkbox') {
|
|
|
|
value = $this.prop('checked');
|
|
|
|
} else {
|
|
|
|
value = $this.val();
|
|
|
|
}
|
|
|
|
if ($this.attr('data-type') === 'int') {
|
|
|
|
value = parseInt(value, 10);
|
|
|
|
}
|
|
|
|
options[key] = value;
|
|
|
|
});
|
|
|
|
return options;
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sets the mount options to the dropdown controls
|
|
|
|
*
|
|
|
|
* @param {Object} options mount options
|
2015-03-31 17:25:33 +03:00
|
|
|
* @param {Array} enabledOptions enabled mount options
|
2015-03-16 16:07:53 +03:00
|
|
|
*/
|
2015-03-31 17:25:33 +03:00
|
|
|
setOptions: function(options, enabledOptions) {
|
2015-03-16 16:07:53 +03:00
|
|
|
var $el = this.$el;
|
|
|
|
_.each(options, function(value, key) {
|
|
|
|
var $optionEl = $el.find('input, select').filterAttr('name', key);
|
|
|
|
if ($optionEl.attr('type') === 'checkbox') {
|
|
|
|
if (_.isString(value)) {
|
|
|
|
value = (value === 'true');
|
|
|
|
}
|
|
|
|
$optionEl.prop('checked', !!value);
|
|
|
|
} else {
|
|
|
|
$optionEl.val(value);
|
|
|
|
}
|
|
|
|
});
|
2015-03-31 17:25:33 +03:00
|
|
|
$el.find('.optionRow').each(function(i, row){
|
|
|
|
var $row = $(row);
|
|
|
|
var optionId = $row.find('input, select').attr('name');
|
|
|
|
if (enabledOptions.indexOf(optionId) === -1) {
|
|
|
|
$row.hide();
|
2015-04-02 19:31:26 +03:00
|
|
|
} else {
|
|
|
|
$row.show();
|
2015-03-31 17:25:33 +03:00
|
|
|
}
|
|
|
|
});
|
2015-03-16 16:07:53 +03:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* @class OCA.External.Settings.MountConfigListView
|
|
|
|
*
|
|
|
|
* @classdesc Mount configuration list view
|
|
|
|
*
|
|
|
|
* @param {Object} $el DOM object containing the list
|
|
|
|
* @param {Object} [options]
|
|
|
|
* @param {int} [options.userListLimit] page size in applicable users dropdown
|
|
|
|
*/
|
|
|
|
var MountConfigListView = function($el, options) {
|
|
|
|
this.initialize($el, options);
|
|
|
|
};
|
2016-02-01 19:44:58 +03:00
|
|
|
|
|
|
|
MountConfigListView.ParameterFlags = {
|
|
|
|
OPTIONAL: 1,
|
|
|
|
USER_PROVIDED: 2
|
|
|
|
};
|
|
|
|
|
|
|
|
MountConfigListView.ParameterTypes = {
|
|
|
|
TEXT: 0,
|
|
|
|
BOOLEAN: 1,
|
|
|
|
PASSWORD: 2,
|
|
|
|
HIDDEN: 3
|
|
|
|
};
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* @memberOf OCA.External.Settings
|
|
|
|
*/
|
2015-08-13 00:01:21 +03:00
|
|
|
MountConfigListView.prototype = _.extend({
|
2014-10-31 13:41:07 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* jQuery element containing the config list
|
|
|
|
*
|
|
|
|
* @type Object
|
|
|
|
*/
|
|
|
|
$el: null,
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Storage config class
|
|
|
|
*
|
|
|
|
* @type Class
|
|
|
|
*/
|
|
|
|
_storageConfigClass: null,
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Flag whether the list is about user storage configs (true)
|
|
|
|
* or global storage configs (false)
|
2015-03-15 22:47:22 +03:00
|
|
|
*
|
2014-10-31 13:41:07 +03:00
|
|
|
* @type bool
|
|
|
|
*/
|
|
|
|
_isPersonal: false,
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Page size in applicable users dropdown
|
|
|
|
*
|
|
|
|
* @type int
|
|
|
|
*/
|
|
|
|
_userListLimit: 30,
|
|
|
|
|
|
|
|
/**
|
|
|
|
* List of supported backends
|
|
|
|
*
|
|
|
|
* @type Object.<string,Object>
|
|
|
|
*/
|
|
|
|
_allBackends: null,
|
|
|
|
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
/**
|
|
|
|
* List of all supported authentication mechanisms
|
|
|
|
*
|
|
|
|
* @type Object.<string,Object>
|
|
|
|
*/
|
|
|
|
_allAuthMechanisms: null,
|
|
|
|
|
2015-03-31 17:25:33 +03:00
|
|
|
_encryptionEnabled: false,
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* @param {Object} $el DOM object containing the list
|
|
|
|
* @param {Object} [options]
|
|
|
|
* @param {int} [options.userListLimit] page size in applicable users dropdown
|
|
|
|
*/
|
|
|
|
initialize: function($el, options) {
|
2015-03-20 12:48:14 +03:00
|
|
|
var self = this;
|
2014-10-31 13:41:07 +03:00
|
|
|
this.$el = $el;
|
|
|
|
this._isPersonal = ($el.data('admin') !== true);
|
|
|
|
if (this._isPersonal) {
|
|
|
|
this._storageConfigClass = OCA.External.Settings.UserStorageConfig;
|
|
|
|
} else {
|
|
|
|
this._storageConfigClass = OCA.External.Settings.GlobalStorageConfig;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (options && !_.isUndefined(options.userListLimit)) {
|
|
|
|
this._userListLimit = options.userListLimit;
|
|
|
|
}
|
|
|
|
|
2015-03-31 17:25:33 +03:00
|
|
|
this._encryptionEnabled = options.encryptionEnabled;
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
// read the backend config that was carefully crammed
|
|
|
|
// into the data-configurations attribute of the select
|
|
|
|
this._allBackends = this.$el.find('.selectBackend').data('configurations');
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
this._allAuthMechanisms = this.$el.find('#addMountPoint .authentication').data('mechanisms');
|
2014-10-31 13:41:07 +03:00
|
|
|
|
2015-08-13 00:01:21 +03:00
|
|
|
this._initEvents();
|
|
|
|
},
|
2015-03-20 12:48:14 +03:00
|
|
|
|
2015-08-13 00:01:21 +03:00
|
|
|
/**
|
|
|
|
* Custom JS event handlers
|
|
|
|
* Trigger callback for all existing configurations
|
|
|
|
*/
|
|
|
|
whenSelectBackend: function(callback) {
|
|
|
|
this.$el.find('tbody tr:not(#addMountPoint)').each(function(i, tr) {
|
2015-09-14 01:23:42 +03:00
|
|
|
var backend = $(tr).find('.backend').data('identifier');
|
2015-08-13 00:01:21 +03:00
|
|
|
callback($(tr), backend);
|
|
|
|
});
|
|
|
|
this.on('selectBackend', callback);
|
|
|
|
},
|
|
|
|
whenSelectAuthMechanism: function(callback) {
|
|
|
|
var self = this;
|
|
|
|
this.$el.find('tbody tr:not(#addMountPoint)').each(function(i, tr) {
|
|
|
|
var authMechanism = $(tr).find('.selectAuthMechanism').val();
|
|
|
|
callback($(tr), authMechanism, self._allAuthMechanisms[authMechanism]['scheme']);
|
|
|
|
});
|
|
|
|
this.on('selectAuthMechanism', callback);
|
2014-10-31 13:41:07 +03:00
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Initialize DOM event handlers
|
|
|
|
*/
|
|
|
|
_initEvents: function() {
|
|
|
|
var self = this;
|
|
|
|
|
2015-03-15 22:47:22 +03:00
|
|
|
var onChangeHandler = _.bind(this._onChange, this);
|
|
|
|
//this.$el.on('input', 'td input', onChangeHandler);
|
|
|
|
this.$el.on('keyup', 'td input', onChangeHandler);
|
|
|
|
this.$el.on('paste', 'td input', onChangeHandler);
|
|
|
|
this.$el.on('change', 'td input:checkbox', onChangeHandler);
|
|
|
|
this.$el.on('change', '.applicable', onChangeHandler);
|
2014-10-31 13:41:07 +03:00
|
|
|
|
|
|
|
this.$el.on('click', '.status>span', function() {
|
|
|
|
self.recheckStorageConfig($(this).closest('tr'));
|
|
|
|
});
|
|
|
|
|
|
|
|
this.$el.on('click', 'td.remove>img', function() {
|
|
|
|
self.deleteStorageConfig($(this).closest('tr'));
|
|
|
|
});
|
|
|
|
|
2015-03-16 16:07:53 +03:00
|
|
|
this.$el.on('click', 'td.mountOptionsToggle>img', function() {
|
|
|
|
self._showMountOptionsDropdown($(this).closest('tr'));
|
|
|
|
});
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
this.$el.on('change', '.selectBackend', _.bind(this._onSelectBackend, this));
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
this.$el.on('change', '.selectAuthMechanism', _.bind(this._onSelectAuthMechanism, this));
|
2014-10-31 13:41:07 +03:00
|
|
|
},
|
|
|
|
|
2015-03-15 22:47:22 +03:00
|
|
|
_onChange: function(event) {
|
|
|
|
var self = this;
|
|
|
|
var $target = $(event.target);
|
2015-03-16 16:07:53 +03:00
|
|
|
if ($target.closest('.dropdown').length) {
|
|
|
|
// ignore dropdown events
|
|
|
|
return;
|
|
|
|
}
|
2015-03-15 22:47:22 +03:00
|
|
|
highlightInput($target);
|
|
|
|
var $tr = $target.closest('tr');
|
2015-09-16 18:19:13 +03:00
|
|
|
this.updateStatus($tr, null);
|
2015-03-15 22:47:22 +03:00
|
|
|
|
|
|
|
var timer = $tr.data('save-timer');
|
|
|
|
clearTimeout(timer);
|
|
|
|
timer = setTimeout(function() {
|
2015-09-16 18:19:13 +03:00
|
|
|
self.saveStorageConfig($tr, null, timer);
|
2015-03-15 22:47:22 +03:00
|
|
|
}, 2000);
|
|
|
|
$tr.data('save-timer', timer);
|
|
|
|
},
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
_onSelectBackend: function(event) {
|
|
|
|
var $target = $(event.target);
|
|
|
|
var $tr = $target.closest('tr');
|
2015-08-13 00:01:21 +03:00
|
|
|
|
2015-09-14 01:23:42 +03:00
|
|
|
var storageConfig = new this._storageConfigClass();
|
|
|
|
storageConfig.mountPoint = $tr.find('.mountPoint input').val();
|
|
|
|
storageConfig.backend = $target.val();
|
2015-09-15 16:38:28 +03:00
|
|
|
$tr.find('.mountPoint input').val('');
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
|
2015-11-22 20:25:32 +03:00
|
|
|
var onCompletion = jQuery.Deferred();
|
|
|
|
$tr = this.newStorage(storageConfig, onCompletion);
|
|
|
|
onCompletion.resolve();
|
2015-08-19 22:04:22 +03:00
|
|
|
|
2015-09-14 01:23:42 +03:00
|
|
|
$tr.find('td.configuration').children().not('[type=hidden]').first().focus();
|
2015-08-19 22:04:22 +03:00
|
|
|
this.saveStorageConfig($tr);
|
2014-10-31 13:41:07 +03:00
|
|
|
},
|
|
|
|
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
_onSelectAuthMechanism: function(event) {
|
|
|
|
var $target = $(event.target);
|
|
|
|
var $tr = $target.closest('tr');
|
2015-08-12 22:03:11 +03:00
|
|
|
var authMechanism = $target.val();
|
2015-11-22 20:25:32 +03:00
|
|
|
|
|
|
|
var onCompletion = jQuery.Deferred();
|
|
|
|
this.configureAuthMechanism($tr, authMechanism, onCompletion);
|
|
|
|
onCompletion.resolve();
|
|
|
|
|
|
|
|
this.saveStorageConfig($tr);
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Configure the storage config with a new authentication mechanism
|
|
|
|
*
|
|
|
|
* @param {jQuery} $tr config row
|
|
|
|
* @param {string} authMechanism
|
|
|
|
* @param {jQuery.Deferred} onCompletion
|
|
|
|
*/
|
|
|
|
configureAuthMechanism: function($tr, authMechanism, onCompletion) {
|
2015-08-12 22:03:11 +03:00
|
|
|
var authMechanismConfiguration = this._allAuthMechanisms[authMechanism];
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
var $td = $tr.find('td.configuration');
|
|
|
|
$td.find('.auth-param').remove();
|
|
|
|
|
2015-08-12 22:03:11 +03:00
|
|
|
$.each(authMechanismConfiguration['configuration'], _.partial(
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
this.writeParameterInput, $td, _, _, ['auth-param']
|
2016-01-19 16:16:11 +03:00
|
|
|
).bind(this));
|
2015-08-19 22:04:22 +03:00
|
|
|
|
2015-08-13 00:01:21 +03:00
|
|
|
this.trigger('selectAuthMechanism',
|
2015-11-22 20:25:32 +03:00
|
|
|
$tr, authMechanism, authMechanismConfiguration['scheme'], onCompletion
|
2015-08-13 00:01:21 +03:00
|
|
|
);
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
},
|
|
|
|
|
2015-09-14 01:23:42 +03:00
|
|
|
/**
|
|
|
|
* Create a config row for a new storage
|
|
|
|
*
|
|
|
|
* @param {StorageConfig} storageConfig storage config to pull values from
|
2015-11-22 20:25:32 +03:00
|
|
|
* @param {jQuery.Deferred} onCompletion
|
2015-09-14 01:23:42 +03:00
|
|
|
* @return {jQuery} created row
|
|
|
|
*/
|
2015-11-22 20:25:32 +03:00
|
|
|
newStorage: function(storageConfig, onCompletion) {
|
2015-09-14 01:23:42 +03:00
|
|
|
var mountPoint = storageConfig.mountPoint;
|
|
|
|
var backend = this._allBackends[storageConfig.backend];
|
|
|
|
|
|
|
|
// FIXME: Replace with a proper Handlebar template
|
|
|
|
var $tr = this.$el.find('tr#addMountPoint');
|
|
|
|
this.$el.find('tbody').append($tr.clone());
|
|
|
|
|
2016-01-19 16:16:11 +03:00
|
|
|
$tr.data('storageConfig', storageConfig);
|
2015-09-14 01:23:42 +03:00
|
|
|
$tr.find('td').last().attr('class', 'remove');
|
|
|
|
$tr.find('td.mountOptionsToggle').removeClass('hidden');
|
|
|
|
$tr.find('td').last().removeAttr('style');
|
|
|
|
$tr.removeAttr('id');
|
|
|
|
$tr.find('select#selectBackend');
|
|
|
|
addSelect2($tr.find('.applicableUsers'), this._userListLimit);
|
|
|
|
|
|
|
|
if (storageConfig.id) {
|
|
|
|
$tr.data('id', storageConfig.id);
|
|
|
|
}
|
|
|
|
|
|
|
|
$tr.find('.backend').text(backend.name);
|
|
|
|
if (mountPoint === '') {
|
|
|
|
mountPoint = this._suggestMountPoint(backend.name);
|
|
|
|
}
|
|
|
|
$tr.find('.mountPoint input').val(mountPoint);
|
|
|
|
$tr.addClass(backend.identifier);
|
|
|
|
$tr.find('.backend').data('identifier', backend.identifier);
|
|
|
|
|
|
|
|
var selectAuthMechanism = $('<select class="selectAuthMechanism"></select>');
|
2016-01-26 15:22:27 +03:00
|
|
|
var neededVisibility = (this._isPersonal) ? StorageConfig.Visibility.PERSONAL : StorageConfig.Visibility.ADMIN;
|
2015-09-14 01:23:42 +03:00
|
|
|
$.each(this._allAuthMechanisms, function(authIdentifier, authMechanism) {
|
2016-01-19 16:21:59 +03:00
|
|
|
if (backend.authSchemes[authMechanism.scheme] && (authMechanism.visibility & neededVisibility)) {
|
2015-09-14 01:23:42 +03:00
|
|
|
selectAuthMechanism.append(
|
|
|
|
$('<option value="'+authMechanism.identifier+'" data-scheme="'+authMechanism.scheme+'">'+authMechanism.name+'</option>')
|
|
|
|
);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
if (storageConfig.authMechanism) {
|
|
|
|
selectAuthMechanism.val(storageConfig.authMechanism);
|
2015-11-22 20:25:32 +03:00
|
|
|
} else {
|
|
|
|
storageConfig.authMechanism = selectAuthMechanism.val();
|
2015-09-14 01:23:42 +03:00
|
|
|
}
|
|
|
|
$tr.find('td.authentication').append(selectAuthMechanism);
|
|
|
|
|
|
|
|
var $td = $tr.find('td.configuration');
|
2016-01-19 16:16:11 +03:00
|
|
|
$.each(backend.configuration, _.partial(this.writeParameterInput, $td).bind(this));
|
2015-09-14 01:23:42 +03:00
|
|
|
|
2015-11-22 20:25:32 +03:00
|
|
|
this.trigger('selectBackend', $tr, backend.identifier, onCompletion);
|
|
|
|
this.configureAuthMechanism($tr, storageConfig.authMechanism, onCompletion);
|
2015-09-14 01:23:42 +03:00
|
|
|
|
|
|
|
if (storageConfig.backendOptions) {
|
|
|
|
$td.children().each(function() {
|
|
|
|
var input = $(this);
|
2015-10-20 15:26:46 +03:00
|
|
|
var val = storageConfig.backendOptions[input.data('parameter')];
|
|
|
|
if (val !== undefined) {
|
|
|
|
input.val(storageConfig.backendOptions[input.data('parameter')]);
|
|
|
|
highlightInput(input);
|
|
|
|
}
|
2015-09-14 01:23:42 +03:00
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2015-09-14 22:21:16 +03:00
|
|
|
var applicable = [];
|
|
|
|
if (storageConfig.applicableUsers) {
|
|
|
|
applicable = applicable.concat(storageConfig.applicableUsers);
|
|
|
|
}
|
|
|
|
if (storageConfig.applicableGroups) {
|
|
|
|
applicable = applicable.concat(
|
|
|
|
_.map(storageConfig.applicableGroups, function(group) {
|
|
|
|
return group+'(group)';
|
|
|
|
})
|
|
|
|
);
|
|
|
|
}
|
|
|
|
$tr.find('.applicableUsers').val(applicable).trigger('change');
|
|
|
|
|
2015-09-14 01:23:42 +03:00
|
|
|
var priorityEl = $('<input type="hidden" class="priority" value="' + backend.priority + '" />');
|
|
|
|
$tr.append(priorityEl);
|
|
|
|
|
|
|
|
if (storageConfig.mountOptions) {
|
|
|
|
$tr.find('input.mountOptions').val(JSON.stringify(storageConfig.mountOptions));
|
|
|
|
} else {
|
|
|
|
// FIXME default backend mount options
|
|
|
|
$tr.find('input.mountOptions').val(JSON.stringify({
|
|
|
|
'encrypt': true,
|
|
|
|
'previews': true,
|
2015-12-02 18:23:50 +03:00
|
|
|
'enable_sharing': true,
|
2015-09-14 01:23:42 +03:00
|
|
|
'filesystem_check_changes': 1
|
|
|
|
}));
|
|
|
|
}
|
|
|
|
|
|
|
|
return $tr;
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Load storages into config rows
|
|
|
|
*/
|
|
|
|
loadStorages: function() {
|
|
|
|
var self = this;
|
|
|
|
|
2015-09-14 15:57:49 +03:00
|
|
|
if (this._isPersonal) {
|
|
|
|
// load userglobal storages
|
|
|
|
$.ajax({
|
|
|
|
type: 'GET',
|
|
|
|
url: OC.generateUrl('apps/files_external/userglobalstorages'),
|
|
|
|
contentType: 'application/json',
|
|
|
|
success: function(result) {
|
2015-11-22 20:25:32 +03:00
|
|
|
var onCompletion = jQuery.Deferred();
|
2015-09-14 15:57:49 +03:00
|
|
|
$.each(result, function(i, storageParams) {
|
2016-01-19 16:16:11 +03:00
|
|
|
var storageConfig;
|
2016-01-19 18:57:20 +03:00
|
|
|
var isUserGlobal = storageParams.type === 'system' && self._isPersonal;
|
2015-09-14 15:57:49 +03:00
|
|
|
storageParams.mountPoint = storageParams.mountPoint.substr(1); // trim leading slash
|
2016-01-19 18:57:20 +03:00
|
|
|
if (isUserGlobal) {
|
2016-01-19 16:16:11 +03:00
|
|
|
storageConfig = new UserGlobalStorageConfig();
|
|
|
|
} else {
|
|
|
|
storageConfig = new self._storageConfigClass();
|
|
|
|
}
|
2015-09-14 15:57:49 +03:00
|
|
|
_.extend(storageConfig, storageParams);
|
2015-11-22 20:25:32 +03:00
|
|
|
var $tr = self.newStorage(storageConfig, onCompletion);
|
2015-09-14 15:57:49 +03:00
|
|
|
|
|
|
|
// userglobal storages must be at the top of the list
|
|
|
|
$tr.detach();
|
|
|
|
self.$el.prepend($tr);
|
|
|
|
|
|
|
|
var $authentication = $tr.find('.authentication');
|
|
|
|
$authentication.text($authentication.find('select option:selected').text());
|
|
|
|
|
|
|
|
// disable any other inputs
|
|
|
|
$tr.find('.mountOptionsToggle, .remove').empty();
|
2016-01-19 16:16:11 +03:00
|
|
|
$tr.find('input:not(.user_provided), select:not(.user_provided)').attr('disabled', 'disabled');
|
|
|
|
|
2016-01-19 18:57:20 +03:00
|
|
|
if (isUserGlobal) {
|
2016-01-19 16:16:11 +03:00
|
|
|
$tr.find('.configuration').find(':not(.user_provided)').remove();
|
|
|
|
} else {
|
|
|
|
// userglobal storages do not expose configuration data
|
|
|
|
$tr.find('.configuration').text(t('files_external', 'Admin defined'));
|
|
|
|
}
|
2015-09-14 15:57:49 +03:00
|
|
|
});
|
2015-11-22 20:25:32 +03:00
|
|
|
onCompletion.resolve();
|
2015-09-14 15:57:49 +03:00
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
2015-09-14 01:23:42 +03:00
|
|
|
var url = this._storageConfigClass.prototype._url;
|
|
|
|
|
|
|
|
$.ajax({
|
|
|
|
type: 'GET',
|
|
|
|
url: OC.generateUrl(url),
|
|
|
|
contentType: 'application/json',
|
|
|
|
success: function(result) {
|
2015-11-22 20:25:32 +03:00
|
|
|
var onCompletion = jQuery.Deferred();
|
2015-09-14 01:23:42 +03:00
|
|
|
$.each(result, function(i, storageParams) {
|
|
|
|
storageParams.mountPoint = storageParams.mountPoint.substr(1); // trim leading slash
|
|
|
|
var storageConfig = new self._storageConfigClass();
|
|
|
|
_.extend(storageConfig, storageParams);
|
2015-11-22 20:25:32 +03:00
|
|
|
var $tr = self.newStorage(storageConfig, onCompletion);
|
2015-09-14 01:23:42 +03:00
|
|
|
self.recheckStorageConfig($tr);
|
|
|
|
});
|
2015-11-22 20:25:32 +03:00
|
|
|
onCompletion.resolve();
|
2015-09-14 01:23:42 +03:00
|
|
|
}
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param {jQuery} $td
|
|
|
|
* @param {string} parameter
|
|
|
|
* @param {string} placeholder
|
|
|
|
* @param {Array} classes
|
|
|
|
* @return {jQuery} newly created input
|
|
|
|
*/
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
writeParameterInput: function($td, parameter, placeholder, classes) {
|
2016-01-19 16:16:11 +03:00
|
|
|
var hasFlag = function(flag) {
|
2016-02-01 19:44:58 +03:00
|
|
|
return (placeholder.flags & flag) === flag;
|
2016-01-19 16:16:11 +03:00
|
|
|
};
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
classes = $.isArray(classes) ? classes : [];
|
|
|
|
classes.push('added');
|
2016-02-01 19:44:58 +03:00
|
|
|
if (hasFlag(MountConfigListView.ParameterFlags.OPTIONAL)) {
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
classes.push('optional');
|
|
|
|
}
|
2016-01-19 16:16:11 +03:00
|
|
|
|
2016-02-01 19:44:58 +03:00
|
|
|
if (hasFlag(MountConfigListView.ParameterFlags.USER_PROVIDED)) {
|
2016-01-19 16:16:11 +03:00
|
|
|
if (this._isPersonal) {
|
|
|
|
classes.push('user_provided');
|
|
|
|
} else {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
var newElement;
|
2016-01-19 16:16:11 +03:00
|
|
|
|
2016-02-01 19:44:58 +03:00
|
|
|
var trimmedPlaceholder = placeholder.value;
|
|
|
|
if (placeholder.type === MountConfigListView.ParameterTypes.PASSWORD) {
|
2016-01-19 16:16:11 +03:00
|
|
|
newElement = $('<input type="password" class="'+classes.join(' ')+'" data-parameter="'+parameter+'" placeholder="'+ trimmedPlaceholder+'" />');
|
2016-02-01 19:44:58 +03:00
|
|
|
} else if (placeholder.type === MountConfigListView.ParameterTypes.BOOLEAN) {
|
2015-09-17 18:39:27 +03:00
|
|
|
var checkboxId = _.uniqueId('checkbox_');
|
2016-01-19 16:16:11 +03:00
|
|
|
newElement = $('<input type="checkbox" id="'+checkboxId+'" class="'+classes.join(' ')+'" data-parameter="'+parameter+'" /><label for="'+checkboxId+'">'+ trimmedPlaceholder+'</label>');
|
2016-02-01 19:44:58 +03:00
|
|
|
} else if (placeholder.type === MountConfigListView.ParameterTypes.HIDDEN) {
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
newElement = $('<input type="hidden" class="'+classes.join(' ')+'" data-parameter="'+parameter+'" />');
|
|
|
|
} else {
|
2016-01-19 16:16:11 +03:00
|
|
|
newElement = $('<input type="text" class="'+classes.join(' ')+'" data-parameter="'+parameter+'" placeholder="'+ trimmedPlaceholder+'" />');
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
}
|
|
|
|
highlightInput(newElement);
|
|
|
|
$td.append(newElement);
|
2015-09-14 01:23:42 +03:00
|
|
|
return newElement;
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
},
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* Gets the storage model from the given row
|
|
|
|
*
|
|
|
|
* @param $tr row element
|
|
|
|
* @return {OCA.External.StorageConfig} storage model instance
|
|
|
|
*/
|
|
|
|
getStorageConfig: function($tr) {
|
2015-09-14 01:23:42 +03:00
|
|
|
var storageId = $tr.data('id');
|
2014-10-31 13:41:07 +03:00
|
|
|
if (!storageId) {
|
|
|
|
// new entry
|
|
|
|
storageId = null;
|
|
|
|
}
|
2016-01-19 16:16:11 +03:00
|
|
|
|
|
|
|
var storage = $tr.data('storageConfig');
|
|
|
|
if (!storage) {
|
|
|
|
storage = new this._storageConfigClass(storageId);
|
|
|
|
}
|
|
|
|
storage.errors = null;
|
2014-10-31 13:41:07 +03:00
|
|
|
storage.mountPoint = $tr.find('.mountPoint input').val();
|
2015-09-14 01:23:42 +03:00
|
|
|
storage.backend = $tr.find('.backend').data('identifier');
|
2015-08-12 22:03:11 +03:00
|
|
|
storage.authMechanism = $tr.find('.selectAuthMechanism').val();
|
2014-10-31 13:41:07 +03:00
|
|
|
|
|
|
|
var classOptions = {};
|
|
|
|
var configuration = $tr.find('.configuration input');
|
|
|
|
var missingOptions = [];
|
|
|
|
$.each(configuration, function(index, input) {
|
|
|
|
var $input = $(input);
|
|
|
|
var parameter = $input.data('parameter');
|
|
|
|
if ($input.attr('type') === 'button') {
|
|
|
|
return;
|
|
|
|
}
|
2016-01-19 16:16:11 +03:00
|
|
|
if (!isInputValid($input) && !$input.hasClass('optional')) {
|
2014-10-31 13:41:07 +03:00
|
|
|
missingOptions.push(parameter);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if ($(input).is(':checkbox')) {
|
|
|
|
if ($(input).is(':checked')) {
|
|
|
|
classOptions[parameter] = true;
|
|
|
|
} else {
|
|
|
|
classOptions[parameter] = false;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
classOptions[parameter] = $(input).val();
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
storage.backendOptions = classOptions;
|
|
|
|
if (missingOptions.length) {
|
|
|
|
storage.errors = {
|
|
|
|
backendOptions: missingOptions
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
// gather selected users and groups
|
|
|
|
if (!this._isPersonal) {
|
|
|
|
var groups = [];
|
|
|
|
var users = [];
|
|
|
|
var multiselect = getSelection($tr);
|
|
|
|
$.each(multiselect, function(index, value) {
|
2016-01-19 16:16:11 +03:00
|
|
|
var pos = (value.indexOf)?value.indexOf('(group)'): -1;
|
2014-10-31 13:41:07 +03:00
|
|
|
if (pos !== -1) {
|
|
|
|
groups.push(value.substr(0, pos));
|
|
|
|
} else {
|
|
|
|
users.push(value);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
// FIXME: this should be done in the multiselect change event instead
|
|
|
|
$tr.find('.applicable')
|
|
|
|
.data('applicable-groups', groups)
|
|
|
|
.data('applicable-users', users);
|
|
|
|
|
|
|
|
storage.applicableUsers = users;
|
|
|
|
storage.applicableGroups = groups;
|
2015-03-12 19:27:31 +03:00
|
|
|
|
2015-03-16 16:07:53 +03:00
|
|
|
storage.priority = parseInt($tr.find('input.priority').val() || '100', 10);
|
2014-10-31 13:41:07 +03:00
|
|
|
}
|
|
|
|
|
2015-03-13 14:49:11 +03:00
|
|
|
var mountOptions = $tr.find('input.mountOptions').val();
|
|
|
|
if (mountOptions) {
|
|
|
|
storage.mountOptions = JSON.parse(mountOptions);
|
|
|
|
}
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
return storage;
|
|
|
|
},
|
2012-06-12 19:36:25 +04:00
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
/**
|
|
|
|
* Deletes the storage from the given tr
|
|
|
|
*
|
|
|
|
* @param $tr storage row
|
|
|
|
* @param Function callback callback to call after save
|
|
|
|
*/
|
|
|
|
deleteStorageConfig: function($tr) {
|
|
|
|
var self = this;
|
|
|
|
var configId = $tr.data('id');
|
|
|
|
if (!_.isNumber(configId)) {
|
|
|
|
// deleting unsaved storage
|
|
|
|
$tr.remove();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
var storage = new this._storageConfigClass(configId);
|
|
|
|
this.updateStatus($tr, StorageConfig.Status.IN_PROGRESS);
|
|
|
|
|
|
|
|
storage.destroy({
|
|
|
|
success: function() {
|
|
|
|
$tr.remove();
|
|
|
|
},
|
|
|
|
error: function() {
|
|
|
|
self.updateStatus($tr, StorageConfig.Status.ERROR);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Saves the storage from the given tr
|
|
|
|
*
|
|
|
|
* @param $tr storage row
|
|
|
|
* @param Function callback callback to call after save
|
2015-09-16 18:19:13 +03:00
|
|
|
* @param concurrentTimer only update if the timer matches this
|
2014-10-31 13:41:07 +03:00
|
|
|
*/
|
2015-09-16 18:19:13 +03:00
|
|
|
saveStorageConfig:function($tr, callback, concurrentTimer) {
|
2014-10-31 13:41:07 +03:00
|
|
|
var self = this;
|
|
|
|
var storage = this.getStorageConfig($tr);
|
2016-01-19 16:16:11 +03:00
|
|
|
if (!storage || !storage.validate()) {
|
2014-10-31 13:41:07 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
this.updateStatus($tr, StorageConfig.Status.IN_PROGRESS);
|
|
|
|
storage.save({
|
|
|
|
success: function(result) {
|
2015-09-16 18:19:13 +03:00
|
|
|
if (concurrentTimer === undefined
|
|
|
|
|| $tr.data('save-timer') === concurrentTimer
|
|
|
|
) {
|
2015-09-14 01:23:42 +03:00
|
|
|
self.updateStatus($tr, result.status);
|
|
|
|
$tr.data('id', result.id);
|
2015-09-16 18:19:13 +03:00
|
|
|
|
|
|
|
if (_.isFunction(callback)) {
|
|
|
|
callback(storage);
|
|
|
|
}
|
2014-10-31 13:41:07 +03:00
|
|
|
}
|
|
|
|
},
|
|
|
|
error: function() {
|
2015-09-16 18:19:13 +03:00
|
|
|
if (concurrentTimer === undefined
|
|
|
|
|| $tr.data('save-timer') === concurrentTimer
|
|
|
|
) {
|
|
|
|
self.updateStatus($tr, StorageConfig.Status.ERROR);
|
|
|
|
}
|
2014-10-31 13:41:07 +03:00
|
|
|
}
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Recheck storage availability
|
|
|
|
*
|
|
|
|
* @param {jQuery} $tr storage row
|
|
|
|
* @return {boolean} success
|
|
|
|
*/
|
|
|
|
recheckStorageConfig: function($tr) {
|
|
|
|
var self = this;
|
|
|
|
var storage = this.getStorageConfig($tr);
|
|
|
|
if (!storage.validate()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
this.updateStatus($tr, StorageConfig.Status.IN_PROGRESS);
|
|
|
|
storage.recheck({
|
|
|
|
success: function(result) {
|
2015-09-16 18:58:26 +03:00
|
|
|
self.updateStatus($tr, result.status, result.statusMessage);
|
2014-10-31 13:41:07 +03:00
|
|
|
},
|
|
|
|
error: function() {
|
|
|
|
self.updateStatus($tr, StorageConfig.Status.ERROR);
|
|
|
|
}
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Update status display
|
|
|
|
*
|
|
|
|
* @param {jQuery} $tr
|
|
|
|
* @param {int} status
|
2015-09-16 18:58:26 +03:00
|
|
|
* @param {string} message
|
2014-10-31 13:41:07 +03:00
|
|
|
*/
|
2015-09-16 18:58:26 +03:00
|
|
|
updateStatus: function($tr, status, message) {
|
2014-10-31 13:41:07 +03:00
|
|
|
var $statusSpan = $tr.find('.status span');
|
2015-08-12 21:51:09 +03:00
|
|
|
$statusSpan.removeClass('loading-small success indeterminate error');
|
2014-10-31 13:41:07 +03:00
|
|
|
switch (status) {
|
2015-09-16 18:19:13 +03:00
|
|
|
case null:
|
|
|
|
// remove status
|
|
|
|
break;
|
2014-10-31 13:41:07 +03:00
|
|
|
case StorageConfig.Status.IN_PROGRESS:
|
|
|
|
$statusSpan.addClass('loading-small');
|
|
|
|
break;
|
|
|
|
case StorageConfig.Status.SUCCESS:
|
|
|
|
$statusSpan.addClass('success');
|
|
|
|
break;
|
2015-08-12 21:51:09 +03:00
|
|
|
case StorageConfig.Status.INDETERMINATE:
|
|
|
|
$statusSpan.addClass('indeterminate');
|
|
|
|
break;
|
2014-10-31 13:41:07 +03:00
|
|
|
default:
|
|
|
|
$statusSpan.addClass('error');
|
|
|
|
}
|
2015-09-16 18:58:26 +03:00
|
|
|
$statusSpan.attr('data-original-title', (typeof message === 'string') ? message : '');
|
2014-10-31 13:41:07 +03:00
|
|
|
},
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Suggest mount point name that doesn't conflict with the existing names in the list
|
|
|
|
*
|
|
|
|
* @param {string} defaultMountPoint default name
|
|
|
|
*/
|
|
|
|
_suggestMountPoint: function(defaultMountPoint) {
|
|
|
|
var $el = this.$el;
|
2012-12-29 00:56:48 +04:00
|
|
|
var pos = defaultMountPoint.indexOf('/');
|
|
|
|
if (pos !== -1) {
|
|
|
|
defaultMountPoint = defaultMountPoint.substring(0, pos);
|
|
|
|
}
|
|
|
|
defaultMountPoint = defaultMountPoint.replace(/\s+/g, '');
|
2012-08-14 01:09:37 +04:00
|
|
|
var i = 1;
|
|
|
|
var append = '';
|
|
|
|
var match = true;
|
|
|
|
while (match && i < 20) {
|
|
|
|
match = false;
|
2014-10-31 13:41:07 +03:00
|
|
|
$el.find('tbody td.mountPoint input').each(function(index, mountPoint) {
|
2014-08-14 20:48:34 +04:00
|
|
|
if ($(mountPoint).val() === defaultMountPoint+append) {
|
2012-08-14 01:09:37 +04:00
|
|
|
match = true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
});
|
|
|
|
if (match) {
|
|
|
|
append = i;
|
|
|
|
i++;
|
|
|
|
} else {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2014-10-31 13:41:07 +03:00
|
|
|
return defaultMountPoint + append;
|
2015-03-16 16:07:53 +03:00
|
|
|
},
|
2015-09-14 01:23:42 +03:00
|
|
|
|
2015-03-16 16:07:53 +03:00
|
|
|
/**
|
|
|
|
* Toggles the mount options dropdown
|
|
|
|
*
|
|
|
|
* @param {Object} $tr configuration row
|
2015-09-14 01:23:42 +03:00
|
|
|
*/
|
2015-03-16 16:07:53 +03:00
|
|
|
_showMountOptionsDropdown: function($tr) {
|
|
|
|
if (this._preventNextDropdown) {
|
|
|
|
// prevented because the click was on the toggle
|
|
|
|
this._preventNextDropdown = false;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
var self = this;
|
|
|
|
var storage = this.getStorageConfig($tr);
|
|
|
|
var $toggle = $tr.find('.mountOptionsToggle');
|
|
|
|
var dropDown = new MountOptionsDropdown();
|
2015-12-02 18:23:50 +03:00
|
|
|
var enabledOptions = ['previews', 'filesystem_check_changes', 'enable_sharing'];
|
2015-03-31 17:25:33 +03:00
|
|
|
if (this._encryptionEnabled) {
|
|
|
|
enabledOptions.push('encrypt');
|
|
|
|
}
|
|
|
|
dropDown.show($toggle, storage.mountOptions || [], enabledOptions);
|
2015-03-16 16:07:53 +03:00
|
|
|
$('body').on('mouseup.mountOptionsDropdown', function(event) {
|
|
|
|
var $target = $(event.target);
|
|
|
|
if ($toggle.has($target).length) {
|
|
|
|
// why is it always so hard to make dropdowns behave ?
|
|
|
|
// this prevents the click on the toggle to cause
|
|
|
|
// the dropdown to reopen itself
|
|
|
|
// (preventDefault doesn't work here because the click
|
|
|
|
// event is already in the queue and cannot be cancelled)
|
|
|
|
self._preventNextDropdown = true;
|
|
|
|
}
|
|
|
|
if ($target.closest('.dropdown').length) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
dropDown.hide();
|
|
|
|
});
|
|
|
|
|
|
|
|
dropDown.$el.on('hide', function() {
|
|
|
|
var mountOptions = dropDown.getOptions();
|
|
|
|
$('body').off('mouseup.mountOptionsDropdown');
|
|
|
|
$tr.find('input.mountOptions').val(JSON.stringify(mountOptions));
|
|
|
|
self.saveStorageConfig($tr);
|
|
|
|
});
|
2012-08-29 10:42:49 +04:00
|
|
|
}
|
2015-08-13 00:01:21 +03:00
|
|
|
}, OC.Backbone.Events);
|
2012-08-14 01:09:37 +04:00
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
$(document).ready(function() {
|
2015-04-02 19:17:28 +03:00
|
|
|
var enabled = $('#files_external').attr('data-encryption-enabled');
|
|
|
|
var encryptionEnabled = (enabled ==='true')? true: false;
|
2015-03-31 17:25:33 +03:00
|
|
|
var mountConfigListView = new MountConfigListView($('#externalStorage'), {
|
|
|
|
encryptionEnabled: encryptionEnabled
|
|
|
|
});
|
2015-09-15 00:21:42 +03:00
|
|
|
mountConfigListView.loadStorages();
|
2012-12-29 02:38:24 +04:00
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
// TODO: move this into its own View class
|
2014-10-13 20:40:57 +04:00
|
|
|
var $allowUserMounting = $('#allowUserMounting');
|
|
|
|
$allowUserMounting.bind('change', function() {
|
2014-02-18 19:36:02 +04:00
|
|
|
OC.msg.startSaving('#userMountingMsg');
|
2012-06-08 19:42:00 +04:00
|
|
|
if (this.checked) {
|
|
|
|
OC.AppConfig.setValue('files_external', 'allow_user_mounting', 'yes');
|
2014-06-13 20:14:41 +04:00
|
|
|
$('input[name="allowUserMountingBackends\\[\\]"]').prop('checked', true);
|
2014-06-16 13:33:51 +04:00
|
|
|
$('#userMountingBackends').removeClass('hidden');
|
2014-06-16 13:35:48 +04:00
|
|
|
$('input[name="allowUserMountingBackends\\[\\]"]').eq(0).trigger('change');
|
2012-06-08 19:42:00 +04:00
|
|
|
} else {
|
|
|
|
OC.AppConfig.setValue('files_external', 'allow_user_mounting', 'no');
|
2014-06-16 13:33:51 +04:00
|
|
|
$('#userMountingBackends').addClass('hidden');
|
2012-06-08 19:42:00 +04:00
|
|
|
}
|
2014-12-08 23:40:15 +03:00
|
|
|
OC.msg.finishedSaving('#userMountingMsg', {status: 'success', data: {message: t('files_external', 'Saved')}});
|
2012-05-24 19:06:03 +04:00
|
|
|
});
|
|
|
|
|
2014-02-18 19:36:02 +04:00
|
|
|
$('input[name="allowUserMountingBackends\\[\\]"]').bind('change', function() {
|
|
|
|
OC.msg.startSaving('#userMountingMsg');
|
2015-09-17 19:00:15 +03:00
|
|
|
|
|
|
|
var userMountingBackends = $('input[name="allowUserMountingBackends\\[\\]"]:checked').map(function(){
|
|
|
|
return $(this).val();
|
|
|
|
}).get();
|
|
|
|
var deprecatedBackends = $('input[name="allowUserMountingBackends\\[\\]"][data-deprecate-to]').map(function(){
|
|
|
|
if ($.inArray($(this).data('deprecate-to'), userMountingBackends) !== -1) {
|
|
|
|
return $(this).val();
|
|
|
|
}
|
|
|
|
return null;
|
|
|
|
}).get();
|
|
|
|
userMountingBackends = userMountingBackends.concat(deprecatedBackends);
|
|
|
|
|
2014-06-16 13:35:48 +04:00
|
|
|
OC.AppConfig.setValue('files_external', 'user_mounting_backends', userMountingBackends.join());
|
2014-12-08 23:40:15 +03:00
|
|
|
OC.msg.finishedSaving('#userMountingMsg', {status: 'success', data: {message: t('files_external', 'Saved')}});
|
2014-06-13 20:14:41 +04:00
|
|
|
|
|
|
|
// disable allowUserMounting
|
2014-06-16 13:35:48 +04:00
|
|
|
if(userMountingBackends.length === 0) {
|
2014-10-13 20:40:57 +04:00
|
|
|
$allowUserMounting.prop('checked', false);
|
|
|
|
$allowUserMounting.trigger('change');
|
2014-06-13 20:14:41 +04:00
|
|
|
|
|
|
|
}
|
2014-02-18 19:36:02 +04:00
|
|
|
});
|
2014-10-31 13:41:07 +03:00
|
|
|
|
|
|
|
// global instance
|
|
|
|
OCA.External.Settings.mountConfig = mountConfigListView;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Legacy
|
|
|
|
*
|
|
|
|
* @namespace
|
|
|
|
* @deprecated use OCA.External.Settings.mountConfig instead
|
|
|
|
*/
|
|
|
|
OC.MountConfig = {
|
|
|
|
saveStorage: _.bind(mountConfigListView.saveStorageConfig, mountConfigListView)
|
|
|
|
};
|
2012-09-06 00:17:33 +04:00
|
|
|
});
|
2013-10-10 13:10:32 +04:00
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
// export
|
|
|
|
|
|
|
|
OCA.External = OCA.External || {};
|
|
|
|
/**
|
|
|
|
* @namespace
|
|
|
|
*/
|
|
|
|
OCA.External.Settings = OCA.External.Settings || {};
|
|
|
|
|
|
|
|
OCA.External.Settings.GlobalStorageConfig = GlobalStorageConfig;
|
|
|
|
OCA.External.Settings.UserStorageConfig = UserStorageConfig;
|
|
|
|
OCA.External.Settings.MountConfigListView = MountConfigListView;
|
|
|
|
|
2013-10-10 13:10:32 +04:00
|
|
|
})();
|