1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
5 import { ofType, unionize, UnionOf } from 'common/unionize';
6 import { Dispatch } from "redux";
7 import { RootState } from "../store";
8 import { ServiceRepository } from "services/services";
9 import { SshKeyResource } from 'models/ssh-key';
10 import { User } from "models/user";
11 import { Session } from "models/session";
12 import { Config } from 'common/config';
13 import { matchTokenRoute, matchFedTokenRoute } from 'routes/routes';
14 import { createServices, setAuthorizationHeader } from "services/services";
15 import { cancelLinking } from 'store/link-account-panel/link-account-panel-actions';
16 import { progressIndicatorActions } from "store/progress-indicator/progress-indicator-actions";
17 import { WORKBENCH_LOADING_SCREEN } from 'store/workbench/workbench-actions';
18 import { addRemoteConfig, getRemoteHostConfig } from './auth-action-session';
19 import { getTokenV2 } from 'models/api-client-authorization';
21 export const authActions = unionize({
23 LOGOUT: ofType<{ deleteLinkData: boolean, preservePath: boolean }>(),
24 SET_CONFIG: ofType<{ config: Config }>(),
25 SET_EXTRA_TOKEN: ofType<{ extraApiToken: string, extraApiTokenExpiration?: Date }>(),
26 RESET_EXTRA_TOKEN: {},
27 INIT_USER: ofType<{ user: User, token: string, tokenExpiration?: Date, tokenLocation?: string }>(),
28 USER_DETAILS_REQUEST: {},
29 USER_DETAILS_SUCCESS: ofType<User>(),
30 SET_SSH_KEYS: ofType<SshKeyResource[]>(),
31 ADD_SSH_KEY: ofType<SshKeyResource>(),
32 REMOVE_SSH_KEY: ofType<string>(),
33 SET_HOME_CLUSTER: ofType<string>(),
34 SET_SESSIONS: ofType<Session[]>(),
35 ADD_SESSION: ofType<Session>(),
36 REMOVE_SESSION: ofType<string>(),
37 UPDATE_SESSION: ofType<Session>(),
38 REMOTE_CLUSTER_CONFIG: ofType<{ config: Config }>(),
41 export const initAuth = (config: Config) => async (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository): Promise<any> => {
42 // Cancel any link account ops in progress unless the user has
43 // just logged in or there has been a successful link operation
44 const data = services.linkAccountService.getLinkOpStatus();
45 if (!matchTokenRoute(window.location.pathname) &&
46 (!matchFedTokenRoute(window.location.pathname)) && data === undefined) {
47 await dispatch<any>(cancelLinking());
49 return dispatch<any>(init(config));
52 const init = (config: Config) => async (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => {
53 const remoteHosts = () => getState().auth.remoteHosts;
54 const token = services.authService.getApiToken();
55 let homeCluster = services.authService.getHomeCluster();
56 if (homeCluster && !config.remoteHosts[homeCluster]) {
57 homeCluster = undefined;
59 dispatch(authActions.SET_CONFIG({ config }));
60 Object.keys(remoteHosts()).forEach((remoteUuid: string) => {
61 const remoteHost = remoteHosts()[remoteUuid];
62 if (remoteUuid !== config.uuidPrefix) {
63 dispatch<any>(addRemoteConfig(remoteHost));
66 dispatch(authActions.SET_HOME_CLUSTER(config.loginCluster || homeCluster || config.uuidPrefix));
68 if (token && token !== "undefined") {
69 dispatch(progressIndicatorActions.START_WORKING(WORKBENCH_LOADING_SCREEN));
71 await dispatch<any>(saveApiToken(token));
73 dispatch(progressIndicatorActions.STOP_WORKING(WORKBENCH_LOADING_SCREEN));
78 export const getConfig = (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository): Config => {
79 const state = getState().auth;
80 return state.remoteHostsConfig[state.localCluster];
83 export const getLocalCluster = (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository): string => {
84 return getState().auth.localCluster;
87 export const saveApiToken = (token: string) => async (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository): Promise<any> => {
89 const tokenParts = token.split('/');
90 const auth = getState().auth;
91 config = dispatch<any>(getConfig);
93 // If the token is from a LoginCluster federation, get user & token data
94 // from the token issuing cluster.
98 const lc = (config as Config).loginCluster
99 const tokenCluster = tokenParts.length === 3
100 ? tokenParts[1].substring(0, 5)
102 if (tokenCluster && tokenCluster !== auth.localCluster &&
103 lc && lc === tokenCluster) {
104 config = await getRemoteHostConfig(auth.remoteHosts[tokenCluster]);
107 const svc = createServices(config, { progressFn: () => { }, errorFn: () => { } });
108 setAuthorizationHeader(svc, token);
110 const user = await svc.authService.getUserDetails();
111 const client = await svc.apiClientAuthorizationService.get('current');
112 const tokenExpiration = client.expiresAt ? new Date(client.expiresAt) : undefined;
113 const tokenLocation = await svc.authService.getStorageType();
114 dispatch(authActions.INIT_USER({ user, token, tokenExpiration, tokenLocation }));
116 dispatch(authActions.LOGOUT({ deleteLinkData: false, preservePath: false }));
120 export const getNewExtraToken = (reuseStored: boolean = false) =>
121 async (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => {
122 const extraToken = getState().auth.extraApiToken;
123 if (reuseStored && extraToken !== undefined) {
124 const config = dispatch<any>(getConfig);
125 const svc = createServices(config, { progressFn: () => { }, errorFn: () => { } });
126 setAuthorizationHeader(svc, extraToken);
128 // Check the extra token's validity before using it. Refresh its
129 // expiration date just in case it changed.
130 const client = await svc.apiClientAuthorizationService.get('current');
131 dispatch(authActions.SET_EXTRA_TOKEN({
132 extraApiToken: extraToken,
133 extraApiTokenExpiration: client.expiresAt ? new Date(client.expiresAt) : undefined,
137 dispatch(authActions.RESET_EXTRA_TOKEN());
140 const user = getState().auth.user;
141 const loginCluster = getState().auth.config.clusterConfig.Login.LoginCluster;
142 if (user === undefined) { return; }
143 if (loginCluster !== "" && getState().auth.homeCluster !== loginCluster) { return; }
145 // Do not show errors on the create call, cluster security configuration may not
146 // allow token creation and there's no way to know that from workbench2 side in advance.
147 const client = await services.apiClientAuthorizationService.create(undefined, false);
148 const newExtraToken = getTokenV2(client);
149 dispatch(authActions.SET_EXTRA_TOKEN({
150 extraApiToken: newExtraToken,
151 extraApiTokenExpiration: client.expiresAt ? new Date(client.expiresAt) : undefined,
153 return newExtraToken;
155 console.warn("Cannot create new tokens with the current token, probably because of cluster's security settings.");
160 export const login = (uuidPrefix: string, homeCluster: string, loginCluster: string,
161 remoteHosts: { [key: string]: string }) => (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) => {
162 services.authService.login(uuidPrefix, homeCluster, loginCluster, remoteHosts);
163 dispatch(authActions.LOGIN());
166 export const logout = (deleteLinkData: boolean = false, preservePath: boolean = false) =>
167 (dispatch: Dispatch, getState: () => RootState, services: ServiceRepository) =>
168 dispatch(authActions.LOGOUT({ deleteLinkData, preservePath }))
170 export type AuthAction = UnionOf<typeof authActions>;