1
0
Fork 0
mirror of https://github.com/documize/community.git synced 2025-07-21 22:29:41 +02:00

keycloak aiurth service JS code refactoring

This commit is contained in:
Harvey Kandola 2017-03-20 17:56:15 +00:00
parent 0f9d673eb5
commit 0fedfb199b
7 changed files with 88 additions and 79 deletions

View file

@ -19,52 +19,43 @@ export default Ember.Route.extend({
localStorage: Ember.inject.service(),
queryParams: {
mode: {
refreshModel: false
refreshModel: true
}
},
message: '',
beforeModel(transition) {
this.set('mode', is.not.undefined(transition.queryParams.mode) ? transition.queryParams.mode : 'login');
if (this.get('appMeta.authProvider') !== constants.AuthProvider.Keycloak) {
return;
}
return new Ember.RSVP.Promise((resolve) => {
this.set('mode', is.not.undefined(transition.queryParams.mode) ? transition.queryParams.mode : 'reject');
if (this.get('mode') === 'reject') {
return;
}
this.get('kcAuth').boot().then((kc) => {
if (!kc.authenticated) {
this.get('kcAuth').login().then(() => {
}, (reject) => {
this.get('localStorage').storeSessionItem('kc-error', reject);
this.set('mode', 'reject');
});
if (this.get('mode') === 'reject' || this.get('appMeta.authProvider') !== constants.AuthProvider.Keycloak) {
resolve();
}
this.get('kcAuth').fetchProfile(kc).then((profile) => {
let data = this.get('kcAuth').mapProfile(kc, profile);
this.get("session").authenticate('authenticator:keycloak', data).then(() => {
this.get('audit').record("logged-in-keycloak");
this.transitionTo('folders');
}, (reject) => {
this.get('localStorage').storeSessionItem('kc-error', reject);
this.set('mode', 'reject');
});
this.get('kcAuth').fetchProfile().then((profile) => {
let data = this.get('kcAuth').mapProfile(profile);
}, (reject) => {
this.get('localStorage').storeSessionItem('kc-error', reject);
this.set('mode', 'reject');
});
}, (reject) => {
this.get('localStorage').storeSessionItem('kc-error', reject);
this.set('mode', 'reject');
this.get("session").authenticate('authenticator:keycloak', data).then(() => {
this.get('audit').record("logged-in-keycloak");
this.transitionTo('folders');
}, (reject) => {
this.set('message', reject.Error);
this.set('mode', 'reject');
resolve();
});
}, (reject) => {
this.set('mode', 'reject');
this.set('message', reject);
resolve();
});
});
},
model() {
return {
mode: this.get('mode')
mode: this.get('mode'),
message: this.get('message')
}
}
});

View file

@ -7,6 +7,7 @@
{{#if (is-equal model.mode 'reject')}}
<div class="sso-box">
<p>Keycloak Authentication Failure</p>
<p>Keycloak authentication failure</p>
<p>{{model.message}}</p>
</div>
{{/if}}

View file

@ -18,30 +18,31 @@ export default Ember.Route.extend({
localStorage: Ember.inject.service(),
showLogin: false,
beforeModel(/*transition*/) {
let authProvider = this.get('appMeta.authProvider');
beforeModel(transition) {
return new Ember.RSVP.Promise((resolve) => {
let authProvider = this.get('appMeta.authProvider');
switch (authProvider) {
case constants.AuthProvider.Keycloak:
this.set('showLogin', false);
switch (authProvider) {
case constants.AuthProvider.Keycloak:
this.set('showLogin', false);
this.get('kcAuth').boot().then(() => {
this.get('kcAuth').login().then(() => {
this.transitionTo('auth.keycloak', { queryParams: { mode: 'login' }});
resolve();
}, (reject) => {
this.get('localStorage').storeSessionItem('kc-error', reject);
transition.abort();
console.log (reject); // eslint-disable-line no-console
this.transitionTo('auth.keycloak', { queryParams: { mode: 'reject' }});
});
}, (reject) => {
this.get('localStorage').storeSessionItem('kc-error', reject);
this.transitionTo('auth.keycloak', { queryParams: { mode: 'reject' }});
});
break;
default:
this.set('showLogin', true);
break;
}
break;
default:
this.set('showLogin', true);
resolve();
break;
}
});
},
model() {

View file

@ -22,7 +22,7 @@ const {
export default Ember.Service.extend({
ajax: service(),
localStorage: service(),
kcAuth: service(),
endpoint: `${config.apiHost}/${config.apiNamespace}`,
orgId: '',
title: '',
@ -64,6 +64,7 @@ export default Ember.Service.extend({
return this.get('ajax').request('public/meta').then((response) => {
this.setProperties(response);
return response;
});
}

View file

@ -22,16 +22,26 @@ export default Ember.Service.extend({
ajax: service(),
appMeta: service(),
keycloak: null,
init () {
this._super(...arguments);
this.keycloak = null;
},
config: {},
boot() {
this.set('keycloak', new Keycloak(JSON.parse(this.get('appMeta.authConfig'))));
return new Ember.RSVP.Promise((resolve, reject) => {
if (is.not.undefined(this.get('keycloak')) && is.not.null(this.get('keycloak')) ) {
resolve(this.get('keycloak'));
return;
}
let keycloak = new Keycloak(JSON.parse(this.get('appMeta.authConfig')));
this.set('keycloak', keycloak);
keycloak.onTokenExpired = function () {
keycloak.clearToken();
};
keycloak.onAuthRefreshError = function () {
keycloak.clearToken();
};
this.get('keycloak').init().success(() => {
this.get('audit').record("initialized-keycloak");
resolve(this.get('keycloak'));
@ -42,12 +52,11 @@ export default Ember.Service.extend({
},
login() {
this.set('keycloak', new Keycloak(JSON.parse(this.get('appMeta.authConfig'))));
let url = netUtil.getAppUrl(netUtil.getSubdomain()) + '/auth/keycloak?mode=login';
return new Ember.RSVP.Promise((resolve, reject) => {
this.boot().then(() => {
this.get('keycloak').login({redirectUri: url}).success(() => {
this.boot().then((keycloak) => {
let url = netUtil.getAppUrl(netUtil.getSubdomain()) + '/auth/keycloak?mode=login';
keycloak.login({redirectUri: url}).success(() => {
return resolve();
}).error(() => {
return reject(new Error('login failed'));
@ -57,37 +66,35 @@ export default Ember.Service.extend({
},
logout() {
this.set('keycloak', new Keycloak(JSON.parse(this.get('appMeta.authConfig'))));
return new Ember.RSVP.Promise((resolve, reject) => {
this.boot().then(() => {
this.get('keycloak').logout(JSON.parse(this.get('appMeta.authConfig'))).success(() => {
this.boot().then((keycloak) => {
keycloak.logout(JSON.parse(this.get('appMeta.authConfig'))).success(() => {
this.get('keycloak').clearToken();
resolve();
}).error((error) => {
this.get('keycloak').clearToken();
reject(error);
});
}, (error) => {
reject(error);
});
});
},
fetchProfile(kc) {
fetchProfile() {
return new Ember.RSVP.Promise((resolve, reject) => {
kc.loadUserProfile().success((profile) => {
return resolve(profile);
}).error((err) => {
return reject(err);
this.boot().then((keycloak) => {
keycloak.loadUserProfile().success((profile) => {
resolve(profile);
}).error((err) => {
reject(err);
});
});
});
},
mapProfile(kc, profile) {
mapProfile(profile) {
return {
domain: '',
token: kc.token,
token: this.get('keycloak').token,
remoteId: is.null(profile.id) || is.undefined(profile.id) ? profile.email: profile.id,
email: is.null(profile.email) || is.undefined(profile.email) ? '': profile.email,
username: is.null(profile.username) || is.undefined(profile.username) ? '': profile.username,

View file

@ -89,7 +89,7 @@ func AuthenticateKeycloak(w http.ResponseWriter, r *http.Request) {
// Decode and verify Keycloak JWT
claims, err := decodeKeycloakJWT(a.Token, pk)
if err != nil {
writeServerError(w, method, err)
util.WriteRequestError(w, err.Error())
return
}

View file

@ -146,7 +146,6 @@ func WriteMarshalError(w http.ResponseWriter, err error) {
w.WriteHeader(http.StatusBadRequest)
_, err2 := w.Write([]byte("{Error: 'JSON marshal failed'}"))
log.IfErr(err2)
log.Error("Failed to JSON marshal", err)
}
// WriteJSON serializes data as JSON to HTTP response.
@ -165,6 +164,15 @@ func WriteJSON(w http.ResponseWriter, v interface{}) {
log.IfErr(err)
}
// WriteRequestError sends custom error message.
func WriteRequestError(w http.ResponseWriter, msg string) {
w.Header().Set("Content-Type", "application/json; charset=utf-8")
w.WriteHeader(http.StatusBadRequest)
_, err := w.Write([]byte(fmt.Sprintf("{Error: '%s'}", msg)))
log.IfErr(err)
}
// WriteBadLicense writes 402 when license is invalid
func WriteBadLicense(w http.ResponseWriter) {
w.Header().Set("Content-Type", "application/json; charset=utf-8")