X-Git-Url: https://git.arvados.org/arvados-workbench2.git/blobdiff_plain/5385afcada8666051658c6889c83848702497759..44821dc84765936ce99fa2d760ef683281f0a578:/src/store/auth/auth-action.ts diff --git a/src/store/auth/auth-action.ts b/src/store/auth/auth-action.ts index 8c44aec4..145a461c 100644 --- a/src/store/auth/auth-action.ts +++ b/src/store/auth/auth-action.ts @@ -2,29 +2,29 @@ // // SPDX-License-Identifier: AGPL-3.0 -import { ofType, unionize, UnionOf } from '~/common/unionize'; +import { ofType, unionize, UnionOf } from 'common/unionize'; import { Dispatch } from "redux"; import { RootState } from "../store"; -import { ServiceRepository } from "~/services/services"; -import { SshKeyResource } from '~/models/ssh-key'; -import { User } from "~/models/user"; -import { Session } from "~/models/session"; -import { Config } from '~/common/config'; -import { matchTokenRoute, matchFedTokenRoute } from '~/routes/routes'; -import { createServices, setAuthorizationHeader } from "~/services/services"; -import { cancelLinking } from '~/store/link-account-panel/link-account-panel-actions'; -import { progressIndicatorActions } from "~/store/progress-indicator/progress-indicator-actions"; -import { WORKBENCH_LOADING_SCREEN } from '~/store/workbench/workbench-actions'; -import { addRemoteConfig } from './auth-action-session'; -import { getTokenV2 } from '~/models/api-client-authorization'; +import { ServiceRepository } from "services/services"; +import { SshKeyResource } from 'models/ssh-key'; +import { User } from "models/user"; +import { Session } from "models/session"; +import { Config } from 'common/config'; +import { matchTokenRoute, matchFedTokenRoute } from 'routes/routes'; +import { createServices, setAuthorizationHeader } from "services/services"; +import { cancelLinking } from 'store/link-account-panel/link-account-panel-actions'; +import { progressIndicatorActions } from "store/progress-indicator/progress-indicator-actions"; +import { WORKBENCH_LOADING_SCREEN } from 'store/workbench/workbench-actions'; +import { addRemoteConfig, getRemoteHostConfig } from './auth-action-session'; +import { getTokenV2 } from 'models/api-client-authorization'; export const authActions = unionize({ LOGIN: {}, - LOGOUT: ofType<{ deleteLinkData: boolean }>(), + LOGOUT: ofType<{ deleteLinkData: boolean, preservePath: boolean }>(), SET_CONFIG: ofType<{ config: Config }>(), SET_EXTRA_TOKEN: ofType<{ extraApiToken: string, extraApiTokenExpiration?: Date }>(), RESET_EXTRA_TOKEN: {}, - INIT_USER: ofType<{ user: User, token: string, tokenExpiration?: Date }>(), + INIT_USER: ofType<{ user: User, token: string, tokenExpiration?: Date, tokenLocation?: string }>(), USER_DETAILS_REQUEST: {}, USER_DETAILS_SUCCESS: ofType(), SET_SSH_KEYS: ofType(), @@ -42,8 +42,8 @@ export const initAuth = (config: Config) => async (dispatch: Dispatch, getState: // Cancel any link account ops in progress unless the user has // just logged in or there has been a successful link operation const data = services.linkAccountService.getLinkOpStatus(); - if (!matchTokenRoute(location.pathname) && - (!matchFedTokenRoute(location.pathname)) && data === undefined) { + if (!matchTokenRoute(window.location.pathname) && + (!matchFedTokenRoute(window.location.pathname)) && data === undefined) { await dispatch(cancelLinking()); } return dispatch(init(config)); @@ -68,9 +68,8 @@ const init = (config: Config) => async (dispatch: Dispatch, getState: () => Root if (token && token !== "undefined") { dispatch(progressIndicatorActions.START_WORKING(WORKBENCH_LOADING_SCREEN)); try { - await dispatch(saveApiToken(token)); // .then(() => { - await dispatch(progressIndicatorActions.STOP_WORKING(WORKBENCH_LOADING_SCREEN)); - } catch (e) { + await dispatch(saveApiToken(token)); + } finally { dispatch(progressIndicatorActions.STOP_WORKING(WORKBENCH_LOADING_SCREEN)); } } @@ -81,17 +80,40 @@ export const getConfig = (dispatch: Dispatch, getState: () => RootState, service return state.remoteHostsConfig[state.localCluster]; }; +export const getLocalCluster = (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository): string => { + return getState().auth.localCluster; +}; + export const saveApiToken = (token: string) => async (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository): Promise => { - const config = dispatch(getConfig); + let config: any; + const tokenParts = token.split('/'); + const auth = getState().auth; + config = dispatch(getConfig); + + // If the token is from a LoginCluster federation, get user & token data + // from the token issuing cluster. + if (!config) { + return; + } + const lc = (config as Config).loginCluster + const tokenCluster = tokenParts.length === 3 + ? tokenParts[1].substring(0, 5) + : undefined; + if (tokenCluster && tokenCluster !== auth.localCluster && + lc && lc === tokenCluster) { + config = await getRemoteHostConfig(auth.remoteHosts[tokenCluster]); + } + const svc = createServices(config, { progressFn: () => { }, errorFn: () => { } }); setAuthorizationHeader(svc, token); try { const user = await svc.authService.getUserDetails(); const client = await svc.apiClientAuthorizationService.get('current'); const tokenExpiration = client.expiresAt ? new Date(client.expiresAt) : undefined; - dispatch(authActions.INIT_USER({ user, token, tokenExpiration })); + const tokenLocation = await svc.authService.getStorageType(); + dispatch(authActions.INIT_USER({ user, token, tokenExpiration, tokenLocation })); } catch (e) { - dispatch(authActions.LOGOUT({ deleteLinkData: false })); + dispatch(authActions.LOGOUT({ deleteLinkData: false, preservePath: false })); } }; @@ -108,7 +130,7 @@ export const getNewExtraToken = (reuseStored: boolean = false) => const client = await svc.apiClientAuthorizationService.get('current'); dispatch(authActions.SET_EXTRA_TOKEN({ extraApiToken: extraToken, - extraApiTokenExpiration: client.expiresAt ? new Date(client.expiresAt): undefined, + extraApiTokenExpiration: client.expiresAt ? new Date(client.expiresAt) : undefined, })); return extraToken; } catch (e) { @@ -126,7 +148,7 @@ export const getNewExtraToken = (reuseStored: boolean = false) => const newExtraToken = getTokenV2(client); dispatch(authActions.SET_EXTRA_TOKEN({ extraApiToken: newExtraToken, - extraApiTokenExpiration: client.expiresAt ? new Date(client.expiresAt): undefined, + extraApiTokenExpiration: client.expiresAt ? new Date(client.expiresAt) : undefined, })); return newExtraToken; } catch { @@ -141,8 +163,8 @@ export const login = (uuidPrefix: string, homeCluster: string, loginCluster: str dispatch(authActions.LOGIN()); }; -export const logout = (deleteLinkData: boolean = false) => +export const logout = (deleteLinkData: boolean = false, preservePath: boolean = false) => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => - dispatch(authActions.LOGOUT({ deleteLinkData })); + dispatch(authActions.LOGOUT({ deleteLinkData, preservePath })) export type AuthAction = UnionOf;