X-Git-Url: https://git.arvados.org/arvados-workbench2.git/blobdiff_plain/1bd016d1f30c72353e5e3b086dd9778b74efb516..f35559bdd3569d836d084524ff64ed050e3c926e:/src/store/auth/auth-action.ts diff --git a/src/store/auth/auth-action.ts b/src/store/auth/auth-action.ts index 00af5ce5..7ebbbaa6 100644 --- a/src/store/auth/auth-action.ts +++ b/src/store/auth/auth-action.ts @@ -2,23 +2,36 @@ // // SPDX-License-Identifier: AGPL-3.0 -import { ofType, default as unionize, UnionOf } from "unionize"; +import { ofType, unionize, UnionOf } from '~/common/unionize'; import { Dispatch } from "redux"; -import { User } from "~/models/user"; +import { AxiosInstance } from "axios"; import { RootState } from "../store"; import { ServiceRepository } from "~/services/services"; -import { AxiosInstance } from "axios"; +import { SshKeyResource } from '~/models/ssh-key'; +import { User } from "~/models/user"; +import { Session } from "~/models/session"; +import { getDiscoveryURL, Config } from '~/common/config'; +import { initSessions } from "~/store/auth/auth-action-session"; +import Axios from "axios"; +import { AxiosError } from "axios"; export const authActions = unionize({ SAVE_API_TOKEN: ofType(), LOGIN: {}, LOGOUT: {}, + CONFIG: ofType<{ config: Config }>(), INIT: ofType<{ user: User, token: string }>(), USER_DETAILS_REQUEST: {}, - USER_DETAILS_SUCCESS: ofType() -}, { - tag: 'type', - value: 'payload' + USER_DETAILS_SUCCESS: ofType(), + SET_SSH_KEYS: ofType(), + ADD_SSH_KEY: ofType(), + REMOVE_SSH_KEY: ofType(), + SET_HOME_CLUSTER: ofType(), + SET_SESSIONS: ofType(), + ADD_SESSION: ofType(), + REMOVE_SESSION: ofType(), + UPDATE_SESSION: ofType(), + REMOTE_CLUSTER_CONFIG: ofType<{ config: Config }>(), }); function setAuthorizationHeader(services: ServiceRepository, token: string) { @@ -34,15 +47,35 @@ function removeAuthorizationHeader(client: AxiosInstance) { delete client.defaults.headers.common.Authorization; } -export const initAuth = () => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => { +export const initAuth = (config: Config) => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => { const user = services.authService.getUser(); const token = services.authService.getApiToken(); + const homeCluster = services.authService.getHomeCluster(); if (token) { setAuthorizationHeader(services, token); } + dispatch(authActions.CONFIG({ config })); + dispatch(authActions.SET_HOME_CLUSTER(homeCluster || config.uuidPrefix)); if (token && user) { dispatch(authActions.INIT({ user, token })); + dispatch(initSessions(services.authService, config, user)); + dispatch(getUserDetails()).then((user: User) => { + dispatch(authActions.INIT({ user, token })); + }).catch((err: AxiosError) => { + console.log("error"); + console.log(err); + if (err.response) { + // Bad token + if (err.response.status === 401) { + logout()(dispatch, getState, services); + } + } + }); } + Object.keys(config.remoteHosts).map((k) => { + Axios.get(getDiscoveryURL(config.remoteHosts[k])) + .then(response => dispatch(authActions.REMOTE_CLUSTER_CONFIG({ config: response.data }))); + }); }; export const saveApiToken = (token: string) => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => { @@ -51,8 +84,8 @@ export const saveApiToken = (token: string) => (dispatch: Dispatch, getState: () dispatch(authActions.SAVE_API_TOKEN(token)); }; -export const login = () => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => { - services.authService.login(); +export const login = (uuidPrefix: string, homeCluster: string, remoteHosts: { [key: string]: string }) => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => { + services.authService.login(uuidPrefix, homeCluster, remoteHosts); dispatch(authActions.LOGIN()); };