Skip to content

Commit dc7bffb

Browse files
committed
removed secret type per instance since the choosen one is always
accessToken wip #240
1 parent 77665f6 commit dc7bffb

File tree

10 files changed

+25
-56
lines changed

10 files changed

+25
-56
lines changed

app/i18n/de-CH.json

-7
Original file line numberDiff line numberDiff line change
@@ -82,11 +82,6 @@
8282
"startup.welcome.advanced": "Erweiterte Einstellungen",
8383
"startup.advanced.saveDir.title": "balloon-Verzeichnis",
8484
"startup.advanced.saveDir.message": "Den Speicherort für deinen balloon ändern:",
85-
"startup.auth.username": "Benutzername",
86-
"startup.auth.password": "Passwort",
87-
"startup.auth.mfaCode": "Code",
88-
"startup.auth.mfaDescription": "Dieses Konto ist mit multi factor authentication geschützt. Bitte gib den Code vom google authenticator ein:",
89-
"startup.auth.message": "Melde dich bei deinem balloon an:",
9085
"startup.selective.edit": "Selektion anpassen",
9186
"startup.selective.message": "Freigaben werden standardmässig nicht synchronisiert und müssen separat in der Selektiven Synchronisation aktiviert werden.",
9287
"startup.clientInitiatedLogoutWarning.title": "Account getrennt",
@@ -131,8 +126,6 @@
131126
"error.blnUrl.offline": "Der balloon-Server kann nicht erreicht werden. Bitte stelle sicher, dass eine Internetverbindung besteht.",
132127
"error.auth": "Authentifizierungs Fehler",
133128
"error.auth.network_server_error": "Der Server kann nicht erreicht werden, oder hat eine Störung. Bitte versuche es später nochmals.",
134-
"error.auth.credentials": "Authentifizierung fehlgeschlagen",
135-
"error.auth.mfaNotToken": "Der gewählte Account hat Multi Faktor Authentifizierung (MFA) aktiviert. MFA wird nur mit dem Login Flow \"token\" unterstüzt.",
136129
"error.auth.oidc": "Die Authentifizierung mit dem ausgewählten Identity Provider ist fehlgeschlagen.",
137130
"error.auth.filesystem": "Das Balloon Verzeichniss konnte nicht erstellt werden. Bitte stelle sicher, das nicht bereits ein Verzeichnis besteht, und Balloon Schreibrechte hat.",
138131
"error.auth.filesystem.path": "Pfad zum Balloon Verzeichnis: %s",

app/i18n/en-US.json

+1-8
Original file line numberDiff line numberDiff line change
@@ -82,11 +82,6 @@
8282
"startup.welcome.advanced": "Advanced Settings",
8383
"startup.advanced.saveDir.title": "balloon directory",
8484
"startup.advanced.saveDir.message": "Change the directory for your balloon:",
85-
"startup.auth.username": "Username",
86-
"startup.auth.password": "Password",
87-
"startup.auth.mfaCode": "Code",
88-
"startup.auth.mfaDescription": "Your account has been protected with multi factor authentication. Please enter the code from your google authenticator:",
89-
"startup.auth.message": "Authenticate your account with balloon:",
9085
"startup.selective.edit": "Change selection",
9186
"startup.selective.message": "Shares are not synced by default and need to be activated separately in the selective synchronisation.",
9287
"startup.clientInitiatedLogoutWarning.title": "Account unlinked",
@@ -131,9 +126,7 @@
131126
"error.blnUrl.offline": "It looks like the balloon server can not be reached. Please make sure you have a valid internet connection.",
132127
"error.auth": "Authentication error",
133128
"error.auth.network_server_error": "The server can not be reached or it has a temporary error. Please try again later",
134-
"error.auth.credentials": "Authentication failed",
135-
"error.auth.mfaNotToken": "The choosen account multi factor authentication (MFA) activated. MFA is only supported with the login flow \"token\".",
136-
"error.auth.oidc": "There was an error authenticating your account with the choosen identity provider.",
129+
"error.auth.oidc": "There was an error authenticating your account with the identity provider.",
137130
"error.auth.filesystem": "The balloon directory could not be created. Please make sure, there is no existing directory and that balloon has write access.",
138131
"error.auth.filesystem.path": "Path to the balloon directory: %s",
139132

app/lib/auth/controller.js

+2-2
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ module.exports = function(env, clientConfig) {
4141

4242
var promises = [];
4343

44-
promises.push(clientConfig.destroySecret(clientConfig.getSecretType()));
44+
promises.push(clientConfig.destroySecret('accessToken'));
4545

4646
if(excludeRefreshToken !== true) {
4747
promises.push(clientConfig.destroySecret('refreshToken'));
@@ -133,7 +133,7 @@ module.exports = function(env, clientConfig) {
133133

134134
function retrieveLoginSecret() {
135135
return new Promise(function(resolve) {
136-
clientConfig.retrieveSecret(clientConfig.getSecretType()).then((secret) => {
136+
clientConfig.retrieveSecret('accessToken').then((secret) => {
137137
clientConfig.setSecret(secret)
138138
resolve();
139139
}).catch((error) => {

app/lib/config.js

+5-26
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ function initialize(syncMemory, mainSync) {
8585
settings.setAll(newSettings);
8686
if(syncMemory) {
8787
for(key in memorySettings) {
88-
if(env.auth && env.auth.secretStorage === 'config' || (key !== 'password' && key !== 'accessToken') ) {
88+
if(env.auth && env.auth.secretStorage === 'config' || (key !== 'accessToken') ) {
8989
settings.set(key, memorySettings[key]);
9090
}
9191
}
@@ -98,26 +98,6 @@ function initialize(syncMemory, mainSync) {
9898

9999
module.exports = function() {
100100
initialize();
101-
102-
function getSecretType() {
103-
var method;
104-
if(activeInstance) {
105-
method = settings.get('authMethod');
106-
} else {
107-
method = memorySettings['authMethod'];
108-
}
109-
110-
switch(method) {
111-
case 'basic':
112-
return 'password';
113-
break;
114-
case 'token':
115-
case 'oidc':
116-
return 'accessToken';
117-
break;
118-
}
119-
}
120-
121101
var secret, traySecretUpdate;
122102

123103
function set(key, value) {
@@ -159,8 +139,8 @@ module.exports = function() {
159139
var conf = memorySettings;
160140
}
161141

162-
if(include_secret === true && getSecretType()) {
163-
conf[getSecretType()] = secret;
142+
if(include_secret === true) {
143+
conf.accessToken = secret;
164144
}
165145

166146
return conf;
@@ -200,7 +180,6 @@ module.exports = function() {
200180
getSecret: function() {
201181
return secret;
202182
},
203-
getSecretType,
204183
hasSecret: function() {
205184
if(secret === undefined) {
206185
return false;
@@ -209,7 +188,7 @@ module.exports = function() {
209188
}
210189
},
211190
destroySecret: function(type) {
212-
if(getSecretType() === type) {
191+
if('accessToken' === type) {
213192
secret = undefined;
214193
traySecretUpdate();
215194
}
@@ -223,7 +202,7 @@ module.exports = function() {
223202
}
224203
},
225204
storeSecret: function(type, key) {
226-
if(getSecretType() === type) {
205+
if('accessToken' === type) {
227206
secret = key;
228207
traySecretUpdate();
229208
}

app/lib/sync/browser.js

+4-2
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,11 @@ try {
1717
var syncCompleted = false;
1818

1919
ipcRenderer.send('sync-window-loaded');
20-
ipcRenderer.once('secret', function(event, type, secret) {
20+
ipcRenderer.once('secret', function(event, secret) {
2121
var config = clientConfig.getAll(true);
22-
config[type] = secret;
22+
config.accessToken = secret;
23+
//TODO backwards compatibility
24+
config.authMethod = 'oidc';
2325
config.version = globalConfig.get('version');
2426

2527
if(env.sync && env.sync.maxConcurentConnections) {

app/lib/sync/controller.js

+3-3
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ module.exports = function(env, tray) {
173173
});
174174

175175
ipcMain.once('sync-window-loaded', function(){
176-
fullSyncWindow.webContents.send('secret', clientConfig.getSecretType(), clientConfig.getSecret());
176+
fullSyncWindow.webContents.send('secret', clientConfig.getSecret());
177177
});
178178

179179
var syncCompleteListener = function(event, err) {
@@ -354,7 +354,7 @@ module.exports = function(env, tray) {
354354
function updateSelectiveSync(difference, callback) {
355355
pause(true).then(result => {
356356
let config = clientConfig.getAll();
357-
config[clientConfig.getSecretType()] = clientConfig.getSecret();
357+
config.accessToken = clientConfig.getSecret();
358358
config.version = globalConfig.get('version');
359359

360360
const sync = fullSyncFactory(config, logger.getLogger());
@@ -375,7 +375,7 @@ module.exports = function(env, tray) {
375375
function ignoreNewShares(callback) {
376376
pause(true).then(result => {
377377
let config = clientConfig.getAll();
378-
config[clientConfig.getSecretType()] = clientConfig.getSecret();
378+
config.accessToken = clientConfig.getSecret();
379379
config.version = globalConfig.get('version');
380380

381381
const sync = fullSyncFactory(config, logger.getLogger());

app/ui/selective/browser.js

+2-2
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,9 @@ $('document').ready(function() {
4242

4343
ipcRenderer.send('selective-window-loaded');
4444

45-
ipcRenderer.once('secret', function(event, type, secret) {
45+
ipcRenderer.once('secret', function(event, secret) {
4646
var config = clientConfig.getAll(true);
47-
config[type] = secret;
47+
config.accessToken = secret;
4848
config.version = globalConfig.get('version');
4949

5050
initialize(config);

app/ui/selective/controller.js

+1-1
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ module.exports = function(env, clientConfig) {
3636

3737
//TODO pixtron - is it possible to have a generic "request secret method?"
3838
ipcMain.on('selective-window-loaded',function(){
39-
selectiveWindow.webContents.send('secret', clientConfig.getSecretType(), clientConfig.getSecret());
39+
selectiveWindow.webContents.send('secret', clientConfig.getSecret());
4040

4141
if(applyActive === true) selectiveWindow.webContents.executeJavaScript(`isUpdateing()`);
4242
});

app/ui/tray/browser.js

+3-3
Original file line numberDiff line numberDiff line change
@@ -120,12 +120,12 @@ ipcRenderer.on('tray-load-menu' , function(event, menu) {
120120
});
121121

122122
ipcRenderer.send('tray-window-loaded');
123-
ipcRenderer.on('config', function(event, secret, secretType) {
124-
logger.info('got config', {category: 'tray-browser', secretType});
123+
ipcRenderer.on('config', function(event, secret) {
124+
logger.info('got config', {category: 'tray-browser'});
125125

126126
clientConfig.initialize(false);
127127
var config = clientConfig.getAll();
128-
config[secretType] = secret;
128+
config.accessToken = secret;
129129
config.version = globalConfig.get('version');
130130

131131
if(!clientConfig.get('loggedin') || !clientConfig.isActiveInstance()) {

app/ui/tray/controller.js

+4-2
Original file line numberDiff line numberDiff line change
@@ -326,7 +326,9 @@ module.exports = function(env, clientConfig) {
326326

327327
const menu = menuFactory(loadMenu, clientConfig, showLogin, syncStatus)
328328

329-
tray.setContextMenu(menu);
329+
if(tray) {
330+
tray.setContextMenu(menu);
331+
}
330332
}
331333

332334
function emit(key, message) {
@@ -350,7 +352,7 @@ module.exports = function(env, clientConfig) {
350352

351353
function updateSecret() {
352354
showLogin = (!clientConfig.get('loggedin') || !clientConfig.isActiveInstance())
353-
trayWindow.webContents.send('config', clientConfig.getSecret(), clientConfig.getSecretType());
355+
trayWindow.webContents.send('config', clientConfig.getSecret());
354356
updateTrayMenu()
355357
}
356358

0 commit comments

Comments
 (0)