15803: Refactor internal user and API token management
[arvados-workbench2.git] / src / store / auth / auth-action.ts
index 3658c589b6a4814f8dddc359494e744c1b0cf77c..e220acb2edd4c6eab3ae50b76dfea1bee2de6b7d 100644 (file)
 
 import { ofType, unionize, UnionOf } from '~/common/unionize';
 import { Dispatch } from "redux";
-import { reset, stopSubmit } from 'redux-form';
-import { AxiosInstance } from "axios";
 import { RootState } from "../store";
-import { snackbarActions } from '~/store/snackbar/snackbar-actions';
-import { dialogActions } from '~/store/dialog/dialog-actions';
-import { setBreadcrumbs } from '~/store/breadcrumbs/breadcrumbs-actions';
 import { ServiceRepository } from "~/services/services";
-import { getAuthorizedKeysServiceError, AuthorizedKeysServiceError } from '~/services/authorized-keys-service/authorized-keys-service';
-import { KeyType, SshKeyResource } from '~/models/ssh-key';
+import { SshKeyResource } from '~/models/ssh-key';
 import { User } from "~/models/user";
+import { Session } from "~/models/session";
+import { Config } from '~/common/config';
+import { cancelLinking } from '~/store/link-account-panel/link-account-panel-actions';
+import { matchTokenRoute, matchFedTokenRoute } from '~/routes/routes';
+import { createServices, setAuthorizationHeader, removeAuthorizationHeader } from "~/services/services";
 
 export const authActions = unionize({
-    SAVE_API_TOKEN: ofType<string>(),
     LOGIN: {},
     LOGOUT: {},
+    CONFIG: ofType<{ config: Config }>(),
     INIT: ofType<{ user: User, token: string }>(),
     USER_DETAILS_REQUEST: {},
     USER_DETAILS_SUCCESS: ofType<User>(),
     SET_SSH_KEYS: ofType<SshKeyResource[]>(),
-    ADD_SSH_KEY: ofType<SshKeyResource>()
+    ADD_SSH_KEY: ofType<SshKeyResource>(),
+    REMOVE_SSH_KEY: ofType<string>(),
+    SET_HOME_CLUSTER: ofType<string>(),
+    SET_SESSIONS: ofType<Session[]>(),
+    ADD_SESSION: ofType<Session>(),
+    REMOVE_SESSION: ofType<string>(),
+    UPDATE_SESSION: ofType<Session>(),
+    REMOTE_CLUSTER_CONFIG: ofType<{ config: Config }>(),
 });
 
-export const SSH_KEY_CREATE_FORM_NAME = 'sshKeyCreateFormName';
-
-export interface SshKeyCreateFormDialogData {
-    publicKey: string;
-    name: string;
-}
-
-function setAuthorizationHeader(services: ServiceRepository, token: string) {
-    services.apiClient.defaults.headers.common = {
-        Authorization: `OAuth2 ${token}`
-    };
-    services.webdavClient.defaults.headers = {
-        Authorization: `OAuth2 ${token}`
-    };
-}
-
-function removeAuthorizationHeader(client: AxiosInstance) {
-    delete client.defaults.headers.common.Authorization;
-}
+export const initAuth = (config: Config) => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => {
+    // Cancel any link account ops in progress unless the user has
+    // just logged in or there has been a successful link operation
+    const data = services.linkAccountService.getLinkOpStatus();
+    if (!matchTokenRoute(location.pathname) && (!matchFedTokenRoute(location.pathname)) && data === undefined) {
+        dispatch<any>(cancelLinking()).then(() => {
+            dispatch<any>(init(config));
+        });
+    }
+    else {
+        dispatch<any>(init(config));
+    }
+};
 
-export const initAuth = () => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => {
-    const user = services.authService.getUser();
+const init = (config: Config) => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => {
     const token = services.authService.getApiToken();
-    if (token) {
-        setAuthorizationHeader(services, token);
+    let homeCluster = services.authService.getHomeCluster();
+    if (homeCluster && !config.remoteHosts[homeCluster]) {
+        homeCluster = undefined;
     }
-    if (token && user) {
-        dispatch(authActions.INIT({ user, token }));
+    dispatch(authActions.CONFIG({ config }));
+    dispatch(authActions.SET_HOME_CLUSTER(config.loginCluster || homeCluster || config.uuidPrefix));
+
+    if (token && token !== "undefined") {
+        dispatch<any>(saveApiToken(token));
     }
 };
 
-export const saveApiToken = (token: string) => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => {
-    services.authService.saveApiToken(token);
-    setAuthorizationHeader(services, token);
-    dispatch(authActions.SAVE_API_TOKEN(token));
+export const getConfig = (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository): Config => {
+    const state = getState().auth;
+    return state.remoteHostsConfig[state.localCluster];
 };
 
-export const login = () => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => {
-    services.authService.login();
-    dispatch(authActions.LOGIN());
+export const saveApiToken = (token: string) => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository): Promise<any> => {
+    const config = dispatch<any>(getConfig);
+    const svc = createServices(config, { progressFn: () => { }, errorFn: () => { } });
+    setAuthorizationHeader(svc, token);
+    return svc.authService.getUserDetails().then((user: User) => {
+        dispatch(authActions.INIT({ user, token }));
+    });
 };
 
-export const logout = () => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => {
+export const login = (uuidPrefix: string, homeCluster: string, loginCluster: string,
+    remoteHosts: { [key: string]: string }) => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => {
+        services.authService.login(uuidPrefix, homeCluster, loginCluster, remoteHosts);
+        dispatch(authActions.LOGIN());
+    };
+
+export const logout = (deleteLinkData: boolean = false) => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => {
+    if (deleteLinkData) {
+        services.linkAccountService.removeAccountToLink();
+    }
     services.authService.removeApiToken();
     services.authService.removeUser();
-    removeAuthorizationHeader(services.apiClient);
+    removeAuthorizationHeader(services);
     services.authService.logout();
     dispatch(authActions.LOGOUT());
 };
 
-export const getUserDetails = () => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository): Promise<User> => {
-    dispatch(authActions.USER_DETAILS_REQUEST());
-    return services.authService.getUserDetails().then(user => {
-        services.authService.saveUser(user);
-        dispatch(authActions.USER_DETAILS_SUCCESS(user));
-        return user;
-    });
-};
-
-export const openSshKeyCreateDialog = () => dialogActions.OPEN_DIALOG({ id: SSH_KEY_CREATE_FORM_NAME, data: {} });
-
-export const createSshKey = (data: SshKeyCreateFormDialogData) =>
-    async (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => {
-        try {
-            const userUuid = getState().auth.user!.uuid;
-            const { name, publicKey } = data;
-            const newSshKey = await services.authorizedKeysService.create({
-                name, 
-                publicKey,
-                keyType: KeyType.SSH,
-                authorizedUserUuid: userUuid
-            });
-            dispatch(dialogActions.CLOSE_DIALOG({ id: SSH_KEY_CREATE_FORM_NAME }));
-            dispatch(reset(SSH_KEY_CREATE_FORM_NAME));
-            dispatch(authActions.ADD_SSH_KEY(newSshKey));
-            dispatch(snackbarActions.OPEN_SNACKBAR({
-                message: "Public key has been successfully created.",
-                hideDuration: 2000
-            }));
-        } catch (e) {
-            const error = getAuthorizedKeysServiceError(e);
-            if (error === AuthorizedKeysServiceError.UNIQUE_PUBLIC_KEY) {
-                dispatch(stopSubmit(SSH_KEY_CREATE_FORM_NAME, { publicKey: 'Public key already exists.' }));
-            } else if (error === AuthorizedKeysServiceError.INVALID_PUBLIC_KEY) {
-                dispatch(stopSubmit(SSH_KEY_CREATE_FORM_NAME, { publicKey: 'Public key is invalid' }));
-            }
-        }
-    };
-
-export const loadSshKeysPanel = () =>
-    async (dispatch: Dispatch<any>, getState: () => RootState, services: ServiceRepository) => {
-        try {
-            dispatch(setBreadcrumbs([{ label: 'SSH Keys'}]));
-            const response = await services.authorizedKeysService.list();
-            dispatch(authActions.SET_SSH_KEYS(response.items));
-        } catch (e) {
-            return;
-        }
-    };
-
-
 export type AuthAction = UnionOf<typeof authActions>;