LOGIN: {},
LOGOUT: ofType<{ deleteLinkData: boolean }>(),
SET_CONFIG: ofType<{ config: Config }>(),
- SET_EXTRA_TOKEN: ofType<{ extraToken: string }>(),
- INIT_USER: ofType<{ user: User, token: string }>(),
+ SET_EXTRA_TOKEN: ofType<{ extraApiToken: string, extraApiTokenExpiration?: Date }>(),
+ INIT_USER: ofType<{ user: User, token: string, tokenExpiration?: Date }>(),
USER_DETAILS_REQUEST: {},
USER_DETAILS_SUCCESS: ofType<User>(),
SET_SSH_KEYS: ofType<SshKeyResource[]>(),
setAuthorizationHeader(svc, token);
try {
const user = await svc.authService.getUserDetails();
- dispatch(authActions.INIT_USER({ user, token }));
+ const client = await svc.apiClientAuthorizationService.get('current');
+ const tokenExpiration = client.expiresAt ? new Date(client.expiresAt) : undefined;
+ dispatch(authActions.INIT_USER({ user, token, tokenExpiration }));
} catch (e) {
dispatch(authActions.LOGOUT({ deleteLinkData: false }));
}
// allow token creation and there's no way to know that from workbench2 side in advance.
const client = await services.apiClientAuthorizationService.create(undefined, false);
const newExtraToken = getTokenV2(client);
- dispatch(authActions.SET_EXTRA_TOKEN({ extraToken: newExtraToken }));
+ dispatch(authActions.SET_EXTRA_TOKEN({
+ extraApiToken: newExtraToken,
+ extraApiTokenExpiration: client.expiresAt ? new Date(client.expiresAt): undefined,
+ }));
return newExtraToken;
} catch {
console.warn("Cannot create new tokens with the current token, probably because of cluster's security settings.");
export interface AuthState {
user?: User;
apiToken?: string;
+ apiTokenExpiration?: Date;
extraApiToken?: string;
+ extraApiTokenExpiration?: Date;
sshKeys: SshKeyResource[];
sessions: Session[];
localCluster: string;
const initialState: AuthState = {
user: undefined,
apiToken: undefined,
+ apiTokenExpiration: undefined,
extraApiToken: undefined,
+ extraApiTokenExpiration: undefined,
sshKeys: [],
sessions: [],
localCluster: "",
export const authReducer = (services: ServiceRepository) => (state = initialState, action: AuthAction) => {
return authActions.match(action, {
- SET_CONFIG: ({ config }) => {
- return {
+ SET_CONFIG: ({ config }) =>
+ ({
...state,
config,
localCluster: config.uuidPrefix,
- remoteHosts: { ...config.remoteHosts, [config.uuidPrefix]: new URL(config.rootUrl).host },
+ remoteHosts: {
+ ...config.remoteHosts,
+ [config.uuidPrefix]: new URL(config.rootUrl).host
+ },
homeCluster: config.loginCluster || config.uuidPrefix,
loginCluster: config.loginCluster,
- remoteHostsConfig: { ...state.remoteHostsConfig, [config.uuidPrefix]: config }
- };
- },
- REMOTE_CLUSTER_CONFIG: ({ config }) => {
- return {
+ remoteHostsConfig: {
+ ...state.remoteHostsConfig,
+ [config.uuidPrefix]: config
+ }
+ }),
+ REMOTE_CLUSTER_CONFIG: ({ config }) =>
+ ({
...state,
- remoteHostsConfig: { ...state.remoteHostsConfig, [config.uuidPrefix]: config },
- };
- },
- SET_EXTRA_TOKEN: ({ extraToken }) => ({ ...state, extraApiToken: extraToken }),
- INIT_USER: ({ user, token }) => {
- return { ...state, user, apiToken: token, homeCluster: user.uuid.substr(0, 5) };
- },
- LOGIN: () => {
- return state;
- },
- LOGOUT: () => {
- return { ...state, apiToken: undefined };
- },
- USER_DETAILS_SUCCESS: (user: User) => {
- return { ...state, user, homeCluster: user.uuid.substr(0, 5) };
- },
- SET_SSH_KEYS: (sshKeys: SshKeyResource[]) => {
- return { ...state, sshKeys };
- },
- ADD_SSH_KEY: (sshKey: SshKeyResource) => {
- return { ...state, sshKeys: state.sshKeys.concat(sshKey) };
- },
- REMOVE_SSH_KEY: (uuid: string) => {
- return { ...state, sshKeys: state.sshKeys.filter((sshKey) => sshKey.uuid !== uuid) };
- },
- SET_HOME_CLUSTER: (homeCluster: string) => {
- return { ...state, homeCluster };
- },
- SET_SESSIONS: (sessions: Session[]) => {
- return { ...state, sessions };
- },
- ADD_SESSION: (session: Session) => {
- return { ...state, sessions: state.sessions.concat(session) };
- },
- REMOVE_SESSION: (clusterId: string) => {
- return {
+ remoteHostsConfig: {
+ ...state.remoteHostsConfig,
+ [config.uuidPrefix]: config
+ },
+ }),
+ SET_EXTRA_TOKEN: ({ extraApiToken, extraApiTokenExpiration }) =>
+ ({ ...state, extraApiToken, extraApiTokenExpiration }),
+ INIT_USER: ({ user, token, tokenExpiration }) =>
+ ({ ...state,
+ user,
+ apiToken: token,
+ apiTokenExpiration: tokenExpiration,
+ homeCluster: user.uuid.substr(0, 5)
+ }),
+ LOGIN: () => state,
+ LOGOUT: () => ({ ...state, apiToken: undefined }),
+ USER_DETAILS_SUCCESS: (user: User) =>
+ ({ ...state, user, homeCluster: user.uuid.substr(0, 5) }),
+ SET_SSH_KEYS: (sshKeys: SshKeyResource[]) => ({ ...state, sshKeys }),
+ ADD_SSH_KEY: (sshKey: SshKeyResource) =>
+ ({ ...state, sshKeys: state.sshKeys.concat(sshKey) }),
+ REMOVE_SSH_KEY: (uuid: string) =>
+ ({ ...state, sshKeys: state.sshKeys.filter((sshKey) => sshKey.uuid !== uuid) }),
+ SET_HOME_CLUSTER: (homeCluster: string) => ({ ...state, homeCluster }),
+ SET_SESSIONS: (sessions: Session[]) => ({ ...state, sessions }),
+ ADD_SESSION: (session: Session) =>
+ ({ ...state, sessions: state.sessions.concat(session) }),
+ REMOVE_SESSION: (clusterId: string) =>
+ ({
...state,
sessions: state.sessions.filter(
session => session.clusterId !== clusterId
)
- };
- },
- UPDATE_SESSION: (session: Session) => {
- return {
+ }),
+ UPDATE_SESSION: (session: Session) =>
+ ({
...state,
sessions: state.sessions.map(
s => s.clusterId === session.clusterId ? session : s
)
- };
- },
+ }),
default: () => state
});
};