diff --git a/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/public/js/view.js b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/public/js/view.js
new file mode 100644
index 0000000000..067565db8e
--- /dev/null
+++ b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/public/js/view.js
@@ -0,0 +1,2316 @@
+/*
+ * Copyright (c) 2015, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
+ *
+ * WSO2 Inc. licenses this file to you under the Apache License,
+ * Version 2.0 (the "License"); you may not use this file except
+ * in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
+ * either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+var validateStep = {};
+var skipStep = {};
+var stepForwardFrom = {};
+var stepBackFrom = {};
+var policy = {};
+var configuredOperations = [];
+
+var baseApiUrl = "/api/device-mgt/v1.0";
+
+// Constants to define platform types available
+var platformTypeConstants = {
+ "ANDROID": "android",
+ "IOS": "ios",
+ "WINDOWS": "windows"
+};
+
+// Constants to define Android Operation Constants
+var androidOperationConstants = {
+ "PASSCODE_POLICY_OPERATION": "passcode-policy",
+ "PASSCODE_POLICY_OPERATION_CODE": "PASSCODE_POLICY",
+ "CAMERA_OPERATION": "camera",
+ "CAMERA_OPERATION_CODE": "CAMERA",
+ "ENCRYPT_STORAGE_OPERATION": "encrypt-storage",
+ "ENCRYPT_STORAGE_OPERATION_CODE": "ENCRYPT_STORAGE",
+ "WIFI_OPERATION": "wifi",
+ "WIFI_OPERATION_CODE": "WIFI"
+};
+
+// Constants to define Android Operation Constants
+var windowsOperationConstants = {
+ "PASSCODE_POLICY_OPERATION": "passcode-policy",
+ "PASSCODE_POLICY_OPERATION_CODE": "PASSCODE_POLICY",
+ "CAMERA_OPERATION": "camera",
+ "CAMERA_OPERATION_CODE": "CAMERA",
+ "ENCRYPT_STORAGE_OPERATION": "encrypt-storage",
+ "ENCRYPT_STORAGE_OPERATION_CODE": "ENCRYPT_STORAGE"
+};
+
+// Constants to define iOS Operation Constants
+var iosOperationConstants = {
+ "PASSCODE_POLICY_OPERATION": "passcode-policy",
+ "PASSCODE_POLICY_OPERATION_CODE": "PASSCODE_POLICY",
+ "RESTRICTIONS_OPERATION": "restrictions",
+ "RESTRICTIONS_OPERATION_CODE": "RESTRICTION",
+ "WIFI_OPERATION": "wifi",
+ "WIFI_OPERATION_CODE": "WIFI",
+ "EMAIL_OPERATION": "email",
+ "EMAIL_OPERATION_CODE": "EMAIL",
+ "AIRPLAY_OPERATION": "airplay",
+ "AIRPLAY_OPERATION_CODE": "AIR_PLAY",
+ "LDAP_OPERATION": "ldap",
+ "LDAP_OPERATION_CODE": "LDAP",
+ "CALENDAR_OPERATION": "calendar",
+ "CALENDAR_OPERATION_CODE": "CALDAV",
+ "CALENDAR_SUBSCRIPTION_OPERATION": "calendar-subscription",
+ "CALENDAR_SUBSCRIPTION_OPERATION_CODE": "CALENDAR_SUBSCRIPTION",
+ "APN_OPERATION": "apn",
+ "APN_OPERATION_CODE": "APN",
+ "CELLULAR_OPERATION": "cellular",
+ "CELLULAR_OPERATION_CODE": "CELLULAR"
+};
+
+/**
+ * Method to update the visibility (i.e. disabled or enabled view)
+ * of grouped input according to the values
+ * that they currently possess.
+ * @param domElement HTML grouped-input element with class name "grouped-input"
+ */
+var updateGroupedInputVisibility = function (domElement) {
+ if ($(".parent-input:first", domElement).is(":checked")) {
+ if ($(".grouped-child-input:first", domElement).hasClass("disabled")) {
+ $(".grouped-child-input:first", domElement).removeClass("disabled");
+ }
+ $(".child-input", domElement).each(function () {
+ $(this).prop('disabled', false);
+ });
+ } else {
+ if (!$(".grouped-child-input:first", domElement).hasClass("disabled")) {
+ $(".grouped-child-input:first", domElement).addClass("disabled");
+ }
+ $(".child-input", domElement).each(function () {
+ $(this).prop('disabled', true);
+ });
+ }
+};
+
+skipStep["policy-platform"] = function (policyPayloadObj) {
+ policy["name"] = policyPayloadObj["policyName"];
+ policy["platform"] = policyPayloadObj["profile"]["deviceType"];
+ var userRoleInput = $("#user-roles-input");
+ var ownershipInput = $("#ownership-input");
+ var userInput = $("#users-select-field");
+ var actionInput = $("#action-input");
+ var policyNameInput = $("#policy-name-input");
+ var policyDescriptionInput = $("#policy-description-input");
+ userRoleInput.val(policyPayloadObj.roles);
+ userInput.val(policyPayloadObj.users);
+ ownershipInput.val(policyPayloadObj.ownershipType);
+ actionInput.val(policyPayloadObj.compliance);
+ policyNameInput.val(policyPayloadObj["policyName"]);
+ policyDescriptionInput.val(policyPayloadObj["description"]);
+ // updating next-page wizard title with selected platform
+ $("#policy-heading").text(policy["platform"].toUpperCase() + " POLICY - " + policy["name"].toUpperCase());
+ // $("#policy-heading").text("Android" + " POLICY - " + "Merged Policy");
+ $("#policy-platform").text(policy["platform"].toUpperCase());
+ $("#policy-assignment").text(policyPayloadObj.ownershipType);
+ $("#policy-action").text(policyPayloadObj.compliance.toUpperCase());
+ $("#policy-description").text(policyPayloadObj["description"]);
+ var policyStatus = "Active";
+ if (policyPayloadObj["active"] == true && policyPayloadObj["updated"] == true) {
+ policyStatus = ' Active/Updated';
+ } else if (policyPayloadObj["active"] == true && policyPayloadObj["updated"] == false) {
+ policyStatus = ' Active';
+ } else if (policyPayloadObj["active"] == false && policyPayloadObj["updated"] == true) {
+ policyStatus = ' Inactive/Updated';
+ } else if (policyPayloadObj["active"] == false && policyPayloadObj["updated"] == false) {
+ policyStatus = ' Inactive';
+ }
+
+ $("#policy-status").html(policyStatus);
+
+ // if (policyPayloadObj.users.length > 0) {
+ // $("#policy-users").text(policyPayloadObj.users.toString().split(",").join(", "));
+ // } else {
+ // $("#users-row").addClass("hidden");
+ // }
+ //
+ // if (policyPayloadObj.roles.length > 0) {
+ // $("#policy-roles").text(policyPayloadObj.roles.toString().split(",").join(", "));
+ // } else {
+ // $("#roles-row").addClass("hidden");
+ // }
+
+ var deviceType = "android";
+ var hiddenOperationsByDeviceType = $("#hidden-operations-" + "android");
+ var hiddenOperationsByDeviceTypeCacheKey = "android" + "HiddenOperations";
+ var hiddenOperationsByDeviceTypeSrc = hiddenOperationsByDeviceType.attr("src");
+
+ setTimeout(
+ function () {
+ $.template(hiddenOperationsByDeviceTypeCacheKey, hiddenOperationsByDeviceTypeSrc, function (template) {
+ var content = template();
+ // pushing profile feature input elements
+ $(".wr-advance-operations").html(content);
+ // populating values and getting the list of configured features
+ var configuredOperations = operationModule.
+ populateProfile(policy["platform"], policyPayloadObj["profile"]["profileFeaturesList"]);
+ // updating grouped input visibility according to the populated values
+ $(".wr-advance-operations li.grouped-input").each(function () {
+ updateGroupedInputVisibility(this);
+ });
+ // enabling previously configured options of last update
+ for (var i = 0; i < configuredOperations.length; ++i) {
+ var configuredOperation = configuredOperations[i];
+ $(".operation-data").filterByData("operation-code", configuredOperation).
+ find(".panel-title .wr-input-control.switch input[type=checkbox]").each(function () {
+ $(this).click();
+ });
+ }
+ });
+ },
+ 250 // time delayed for the execution of above function, 250 milliseconds
+ );
+};
+
+/**
+ * Checks if provided number is valid against a range.
+ *
+ * @param numberInput Number Input
+ * @param min Minimum Limit
+ * @param max Maximum Limit
+ * @returns {boolean} Returns true if input is within the specified range
+ */
+var inputIsValidAgainstRange = function (numberInput, min, max) {
+ return (numberInput == min || (numberInput > min && numberInput < max) || numberInput == max);
+};
+
+/**
+ * Checks if provided input is valid against RegEx input.
+ *
+ * @param regExp Regular expression
+ * @param input Input string to check
+ * @returns {boolean} Returns true if input matches RegEx
+ */
+var inputIsValidAgainstRegExp = function (regExp, input) {
+ return regExp.test(input);
+};
+
+validateStep["policy-profile"] = function () {
+ var validationStatusArray = [];
+ var validationStatus;
+ var operation;
+
+ // starting validation process and updating validationStatus
+ if (policy["platform"] == platformTypeConstants["ANDROID"]) {
+ if (configuredOperations.length == 0) {
+ // updating validationStatus
+ validationStatus = {
+ "error": true,
+ "mainErrorMsg": "You cannot continue. Zero configured features."
+ };
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ } else {
+ // validating each and every configured Operation
+ // Validating PASSCODE_POLICY
+ if ($.inArray(androidOperationConstants["PASSCODE_POLICY_OPERATION_CODE"], configuredOperations) != -1) {
+ // if PASSCODE_POLICY is configured
+ operation = androidOperationConstants["PASSCODE_POLICY_OPERATION"];
+ // initializing continueToCheckNextInputs to true
+ var continueToCheckNextInputs = true;
+
+ // validating first input: passcodePolicyMaxPasscodeAgeInDays
+ var passcodePolicyMaxPasscodeAgeInDays = $("input#passcode-policy-max-passcode-age-in-days").val();
+ if (passcodePolicyMaxPasscodeAgeInDays) {
+ if (!$.isNumeric(passcodePolicyMaxPasscodeAgeInDays)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Provided passcode age is not a number.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (!inputIsValidAgainstRange(passcodePolicyMaxPasscodeAgeInDays, 1, 730)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Provided passcode age is not with in the range of 1-to-730.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+
+ // validating second and last input: passcodePolicyPasscodeHistory
+ if (continueToCheckNextInputs) {
+ var passcodePolicyPasscodeHistory = $("input#passcode-policy-passcode-history").val();
+ if (passcodePolicyPasscodeHistory) {
+ if (!$.isNumeric(passcodePolicyPasscodeHistory)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Provided passcode history is not a number.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (!inputIsValidAgainstRange(passcodePolicyPasscodeHistory, 1, 50)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Provided passcode history is not with in the range of 1-to-50.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+ }
+
+ // at-last, if the value of continueToCheckNextInputs is still true
+ // this means that no error is found
+ if (continueToCheckNextInputs) {
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ }
+
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ // Validating CAMERA
+ if ($.inArray(androidOperationConstants["CAMERA_OPERATION_CODE"], configuredOperations) != -1) {
+ // if CAMERA is configured
+ operation = androidOperationConstants["CAMERA_OPERATION"];
+ // updating validationStatus
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ // Validating ENCRYPT_STORAGE
+ if ($.inArray(androidOperationConstants["ENCRYPT_STORAGE_OPERATION_CODE"], configuredOperations) != -1) {
+ // if ENCRYPT_STORAGE is configured
+ operation = androidOperationConstants["ENCRYPT_STORAGE_OPERATION"];
+ // updating validationStatus
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ // Validating WIFI
+ if ($.inArray(androidOperationConstants["WIFI_OPERATION_CODE"], configuredOperations) != -1) {
+ // if WIFI is configured
+ operation = androidOperationConstants["WIFI_OPERATION"];
+ // initializing continueToCheckNextInputs to true
+ continueToCheckNextInputs = true;
+
+ var wifiSSID = $("input#wifi-ssid").val();
+ if (!wifiSSID) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "WIFI SSID is not given. You cannot proceed.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+
+ // at-last, if the value of continueToCheckNextInputs is still true
+ // this means that no error is found
+ if (continueToCheckNextInputs) {
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ }
+
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ }
+ }
+ if (policy["platform"] == platformTypeConstants["WINDOWS"]) {
+ if (configuredOperations.length == 0) {
+ // updating validationStatus
+ validationStatus = {
+ "error": true,
+ "mainErrorMsg": "You cannot continue. Zero configured features."
+ };
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ } else {
+ // validating each and every configured Operation
+ // Validating PASSCODE_POLICY
+ if ($.inArray(windowsOperationConstants["PASSCODE_POLICY_OPERATION_CODE"], configuredOperations) != -1) {
+ // if PASSCODE_POLICY is configured
+ operation = windowsOperationConstants["PASSCODE_POLICY_OPERATION"];
+ // initializing continueToCheckNextInputs to true
+ var continueToCheckNextInputs = true;
+
+ // validating first input: passcodePolicyMaxPasscodeAgeInDays
+ var passcodePolicyMaxPasscodeAgeInDays = $("input#passcode-policy-max-passcode-age-in-days").val();
+ if (passcodePolicyMaxPasscodeAgeInDays) {
+ if (!$.isNumeric(passcodePolicyMaxPasscodeAgeInDays)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Provided passcode age is not a number.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (!inputIsValidAgainstRange(passcodePolicyMaxPasscodeAgeInDays, 1, 730)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Provided passcode age is not with in the range of 1-to-730.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+
+ // validating second and last input: passcodePolicyPasscodeHistory
+ if (continueToCheckNextInputs) {
+ var passcodePolicyPasscodeHistory = $("input#passcode-policy-passcode-history").val();
+ if (passcodePolicyPasscodeHistory) {
+ if (!$.isNumeric(passcodePolicyPasscodeHistory)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Provided passcode history is not a number.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (!inputIsValidAgainstRange(passcodePolicyPasscodeHistory, 1, 50)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Provided passcode history is not with in the range of 1-to-50.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+ }
+
+ // at-last, if the value of continueToCheckNextInputs is still true
+ // this means that no error is found
+ if (continueToCheckNextInputs) {
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ }
+
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ // Validating CAMERA
+ if ($.inArray(windowsOperationConstants["CAMERA_OPERATION_CODE"], configuredOperations) != -1) {
+ // if CAMERA is configured
+ operation = windowsOperationConstants["CAMERA_OPERATION"];
+ // updating validationStatus
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ // Validating ENCRYPT_STORAGE
+ if ($.inArray(windowsOperationConstants["ENCRYPT_STORAGE_OPERATION_CODE"], configuredOperations) != -1) {
+ // if ENCRYPT_STORAGE is configured
+ operation = windowsOperationConstants["ENCRYPT_STORAGE_OPERATION"];
+ // updating validationStatus
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+
+ }
+ } else if (policy["platform"] == platformTypeConstants["IOS"]) {
+ if (configuredOperations.length == 0) {
+ // updating validationStatus
+ validationStatus = {
+ "error": true,
+ "mainErrorMsg": "You cannot continue. Zero configured features."
+ };
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ } else {
+ // validating each and every configured Operation
+ // Validating PASSCODE_POLICY
+ if ($.inArray(iosOperationConstants["PASSCODE_POLICY_OPERATION_CODE"], configuredOperations) != -1) {
+ // if PASSCODE_POLICY is configured
+ operation = iosOperationConstants["PASSCODE_POLICY_OPERATION"];
+ // initializing continueToCheckNextInputs to true
+ continueToCheckNextInputs = true;
+
+ // validating first input: passcodePolicyMaxPasscodeAgeInDays
+ passcodePolicyMaxPasscodeAgeInDays = $("input#passcode-policy-max-passcode-age-in-days").val();
+ if (passcodePolicyMaxPasscodeAgeInDays) {
+ if (!$.isNumeric(passcodePolicyMaxPasscodeAgeInDays)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Provided passcode age is not a number.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (!inputIsValidAgainstRange(passcodePolicyMaxPasscodeAgeInDays, 1, 730)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Provided passcode age is not with in the range of 1-to-730.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+
+ // validating second and last input: passcodePolicyPasscodeHistory
+ if (continueToCheckNextInputs) {
+ passcodePolicyPasscodeHistory = $("input#passcode-policy-passcode-history").val();
+ if (passcodePolicyPasscodeHistory) {
+ if (!$.isNumeric(passcodePolicyPasscodeHistory)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Provided passcode history is not a number.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (!inputIsValidAgainstRange(passcodePolicyPasscodeHistory, 1, 50)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Provided passcode history is not with in the range of 1-to-50.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+ }
+
+ // at-last, if the value of continueToCheckNextInputs is still true
+ // this means that no error is found
+ if (continueToCheckNextInputs) {
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ }
+
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ // Validating RESTRICTIONS
+ if ($.inArray(iosOperationConstants["RESTRICTIONS_OPERATION_CODE"], configuredOperations) != -1) {
+ // if RESTRICTION is configured
+ operation = iosOperationConstants["RESTRICTIONS_OPERATION"];
+ // initializing continueToCheckNextInputs to true
+ continueToCheckNextInputs = true;
+
+ // getting input values to be validated
+ var restrictionsAutonomousSingleAppModePermittedAppIDsGridChildInputs =
+ "div#restrictions-autonomous-single-app-mode-permitted-app-ids .child-input";
+ if ($(restrictionsAutonomousSingleAppModePermittedAppIDsGridChildInputs).length > 0) {
+ var childInput;
+ var childInputArray = [];
+ var emptyChildInputCount = 0;
+ var duplicatesExist = false;
+ // looping through each child input
+ $(restrictionsAutonomousSingleAppModePermittedAppIDsGridChildInputs).each(function () {
+ childInput = $(this).val();
+ childInputArray.push(childInput);
+ if (!childInput) {
+ // if child input field is empty
+ emptyChildInputCount++;
+ }
+ });
+ // checking for duplicates
+ var initialChildInputArrayLength = childInputArray.length;
+ if (emptyChildInputCount == 0 && initialChildInputArrayLength > 1) {
+ var m, poppedChildInput;
+ for (m = 0; m < (initialChildInputArrayLength - 1); m++) {
+ poppedChildInput = childInputArray.pop();
+ var n;
+ for (n = 0; n < childInputArray.length; n++) {
+ if (poppedChildInput == childInputArray[n]) {
+ duplicatesExist = true;
+ break;
+ }
+ }
+ if (duplicatesExist) {
+ break;
+ }
+ }
+ }
+ // updating validationStatus
+ if (emptyChildInputCount > 0) {
+ // if empty child inputs are present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more permitted App ID entries in " +
+ "Autonomous Single App Mode are empty.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (duplicatesExist) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Duplicate values exist with permitted App ID entries in " +
+ "Autonomous Single App Mode.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+
+ // at-last, if the value of continueToCheckNextInputs is still true
+ // this means that no error is found
+ if (continueToCheckNextInputs) {
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ }
+
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ // Validating WIFI
+ if ($.inArray(iosOperationConstants["WIFI_OPERATION_CODE"], configuredOperations) != -1) {
+ // if WIFI is configured
+ operation = iosOperationConstants["WIFI_OPERATION"];
+ // initializing continueToCheckNextInputs to true
+ continueToCheckNextInputs = true;
+
+ // getting input values to be validated
+ wifiSSID = $("input#wifi-ssid").val();
+ var wifiDomainName = $("input#wifi-domain-name").val();
+ if (!wifiSSID && !wifiDomainName) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Both Wi-Fi SSID and Wi-Fi Domain Name are not given. You cannot proceed.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+
+ if (continueToCheckNextInputs) {
+ // getting proxy-setup value
+ var wifiProxyType = $("select#wifi-proxy-type").find("option:selected").attr("value");
+ if (wifiProxyType == "Manual") {
+ // adds up additional fields to be validated
+ var wifiProxyServer = $("input#wifi-proxy-server").val();
+ if (!wifiProxyServer) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Wi-Fi Proxy Server is required. You cannot proceed.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+
+ if (continueToCheckNextInputs) {
+ var wifiProxyPort = $("input#wifi-proxy-port").val();
+ if (!wifiProxyPort) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Wi-Fi Proxy Port is required. You cannot proceed.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (!$.isNumeric(wifiProxyPort)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Wi-Fi Proxy Port requires a number input.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (!inputIsValidAgainstRange(wifiProxyPort, 0, 65535)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Wi-Fi Proxy Port is not within the range " +
+ "of valid port numbers.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+ }
+ }
+
+ if (continueToCheckNextInputs) {
+ // getting encryption-type value
+ var wifiEncryptionType = $("select#wifi-encryption-type").find("option:selected").attr("value");
+ if (wifiEncryptionType != "None") {
+ var wifiPayloadCertificateAnchorUUIDsGridChildInputs =
+ "div#wifi-payload-certificate-anchor-uuids .child-input";
+ if ($(wifiPayloadCertificateAnchorUUIDsGridChildInputs).length > 0) {
+ emptyChildInputCount = 0;
+ childInputArray = [];
+ duplicatesExist = false;
+ // looping through each child input
+ $(wifiPayloadCertificateAnchorUUIDsGridChildInputs).each(function () {
+ childInput = $(this).val();
+ childInputArray.push(childInput);
+ if (!childInput) {
+ // if child input field is empty
+ emptyChildInputCount++;
+ }
+ });
+ // checking for duplicates
+ initialChildInputArrayLength = childInputArray.length;
+ if (emptyChildInputCount == 0 && initialChildInputArrayLength > 1) {
+ for (m = 0; m < (initialChildInputArrayLength - 1); m++) {
+ poppedChildInput = childInputArray.pop();
+ for (n = 0; n < childInputArray.length; n++) {
+ if (poppedChildInput == childInputArray[n]) {
+ duplicatesExist = true;
+ break;
+ }
+ }
+ if (duplicatesExist) {
+ break;
+ }
+ }
+ }
+ // updating validationStatus
+ if (emptyChildInputCount > 0) {
+ // if empty child inputs are present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more Payload Certificate " +
+ "Anchor UUIDs are empty.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (duplicatesExist) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Duplicate values exist " +
+ "with Payload Certificate Anchor UUIDs.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+
+ if (continueToCheckNextInputs) {
+ var wifiTLSTrustedServerNamesGridChildInputs =
+ "div#wifi-tls-trusted-server-names .child-input";
+ if ($(wifiTLSTrustedServerNamesGridChildInputs).length > 0) {
+ emptyChildInputCount = 0;
+ childInputArray = [];
+ duplicatesExist = false;
+ // looping through each child input
+ $(wifiTLSTrustedServerNamesGridChildInputs).each(function () {
+ childInput = $(this).val();
+ childInputArray.push(childInput);
+ if (!childInput) {
+ // if child input field is empty
+ emptyChildInputCount++;
+ }
+ });
+ // checking for duplicates
+ initialChildInputArrayLength = childInputArray.length;
+ if (emptyChildInputCount == 0 && initialChildInputArrayLength > 1) {
+ for (m = 0; m < (initialChildInputArrayLength - 1); m++) {
+ poppedChildInput = childInputArray.pop();
+ for (n = 0; n < childInputArray.length; n++) {
+ if (poppedChildInput == childInputArray[n]) {
+ duplicatesExist = true;
+ break;
+ }
+ }
+ if (duplicatesExist) {
+ break;
+ }
+ }
+ }
+ // updating validationStatus
+ if (emptyChildInputCount > 0) {
+ // if empty child inputs are present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more TLS Trusted Server Names are empty.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (duplicatesExist) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Duplicate values exist " +
+ "with TLS Trusted Server Names.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+ }
+ }
+ }
+
+ if (continueToCheckNextInputs) {
+ var wifiRoamingConsortiumOIsGridChildInputs = "div#wifi-roaming-consortium-ois .child-input";
+ if ($(wifiRoamingConsortiumOIsGridChildInputs).length > 0) {
+ emptyChildInputCount = 0;
+ var outOfAllowedLengthCount = 0;
+ var invalidAgainstRegExCount = 0;
+ childInputArray = [];
+ duplicatesExist = false;
+ // looping through each child input
+ $(wifiRoamingConsortiumOIsGridChildInputs).each(function () {
+ childInput = $(this).val();
+ childInputArray.push(childInput);
+ if (!childInput) {
+ // if child input field is empty
+ emptyChildInputCount++;
+ } else if (!inputIsValidAgainstLength(childInput, 6, 6) && !inputIsValidAgainstLength(childInput, 10, 10)) {
+ outOfAllowedLengthCount++;
+ } else if (!inputIsValidAgainstRegExp(/^[a-fA-F0-9]+$/, childInput)) {
+ invalidAgainstRegExCount++;
+ }
+ });
+ // checking for duplicates
+ initialChildInputArrayLength = childInputArray.length;
+ if (emptyChildInputCount == 0 && initialChildInputArrayLength > 1) {
+ for (m = 0; m < (initialChildInputArrayLength - 1); m++) {
+ poppedChildInput = childInputArray.pop();
+ for (n = 0; n < childInputArray.length; n++) {
+ if (poppedChildInput == childInputArray[n]) {
+ duplicatesExist = true;
+ break;
+ }
+ }
+ if (duplicatesExist) {
+ break;
+ }
+ }
+ }
+ // updating validationStatus
+ if (emptyChildInputCount > 0) {
+ // if empty child inputs are present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more Roaming Consortium OIs are empty.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (outOfAllowedLengthCount > 0) {
+ // if outOfMaxAllowedLength input is present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more Roaming Consortium OIs " +
+ "are out of allowed length.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (invalidAgainstRegExCount > 0) {
+ // if invalid inputs in terms of hexadecimal format are present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more Roaming Consortium OIs " +
+ "contain non-hexadecimal characters.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (duplicatesExist) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Duplicate values exist with Roaming Consortium OIs.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+ }
+
+ if (continueToCheckNextInputs) {
+ var wifiNAIRealmNamesGridChildInputs = "div#wifi-nai-realm-names .child-input";
+ if ($(wifiNAIRealmNamesGridChildInputs).length > 0) {
+ emptyChildInputCount = 0;
+ childInputArray = [];
+ duplicatesExist = false;
+ // looping through each child input
+ $(wifiNAIRealmNamesGridChildInputs).each(function () {
+ childInput = $(this).val();
+ childInputArray.push(childInput);
+ if (!childInput) {
+ // if child input field is empty
+ emptyChildInputCount++;
+ }
+ });
+ // checking for duplicates
+ initialChildInputArrayLength = childInputArray.length;
+ if (emptyChildInputCount == 0 && initialChildInputArrayLength > 1) {
+ for (m = 0; m < (initialChildInputArrayLength - 1); m++) {
+ poppedChildInput = childInputArray.pop();
+ for (n = 0; n < childInputArray.length; n++) {
+ if (poppedChildInput == childInputArray[n]) {
+ duplicatesExist = true;
+ break;
+ }
+ }
+ if (duplicatesExist) {
+ break;
+ }
+ }
+ }
+ // updating validationStatus
+ if (emptyChildInputCount > 0) {
+ // if empty child inputs are present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more NAI Realm Names are empty.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (duplicatesExist) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Duplicate values exist with NAI Realm Names.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+ }
+
+ if (continueToCheckNextInputs) {
+ var wifiMCCAndMNCsGridChildInputs = "div#wifi-mcc-and-mncs .child-input";
+ if ($(wifiMCCAndMNCsGridChildInputs).length > 0) {
+ var childInputCount = 0;
+ var stringPair;
+ emptyChildInputCount = 0;
+ outOfAllowedLengthCount = 0;
+ var notNumericInputCount = 0;
+ childInputArray = [];
+ duplicatesExist = false;
+ // looping through each child input
+ $(wifiMCCAndMNCsGridChildInputs).each(function () {
+ childInput = $(this).val();
+ // pushing each string pair to childInputArray
+ childInputCount++;
+ if (childInputCount % 2 == 1) {
+ // initialize stringPair value
+ stringPair = "";
+ // append first part of the string
+ stringPair += childInput;
+ } else {
+ // append second part of the string
+ stringPair += childInput;
+ childInputArray.push(stringPair);
+ }
+ // updating emptyChildInputCount & outOfAllowedLengthCount
+ if (!childInput) {
+ // if child input field is empty
+ emptyChildInputCount++;
+ } else if (!$.isNumeric(childInput)) {
+ notNumericInputCount++;
+ } else if (!inputIsValidAgainstLength(childInput, 3, 3)) {
+ outOfAllowedLengthCount++;
+ }
+ });
+ // checking for duplicates
+ initialChildInputArrayLength = childInputArray.length;
+ if (emptyChildInputCount == 0 && initialChildInputArrayLength > 1) {
+ for (m = 0; m < (initialChildInputArrayLength - 1); m++) {
+ poppedChildInput = childInputArray.pop();
+ for (n = 0; n < childInputArray.length; n++) {
+ if (poppedChildInput == childInputArray[n]) {
+ duplicatesExist = true;
+ break;
+ }
+ }
+ if (duplicatesExist) {
+ break;
+ }
+ }
+ }
+ // updating validationStatus
+ if (emptyChildInputCount > 0) {
+ // if empty child inputs are present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more MCC/MNC pairs are empty.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (notNumericInputCount > 0) {
+ // if notNumeric input is present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more MCC/MNC pairs are not numeric.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (outOfAllowedLengthCount > 0) {
+ // if outOfAllowedLength input is present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more MCC/MNC pairs " +
+ "do not fulfill the accepted length of 6 digits.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (duplicatesExist) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Duplicate values exist with MCC/MNC pairs.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+ }
+
+ // at-last, if the value of continueToCheckNextInputs is still true
+ // this means that no error is found
+ if (continueToCheckNextInputs) {
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ }
+
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ // Validating EMAIL
+ if ($.inArray(iosOperationConstants["EMAIL_OPERATION_CODE"], configuredOperations) != -1) {
+ // if EMAIL is configured
+ operation = iosOperationConstants["EMAIL_OPERATION"];
+ // initializing continueToCheckNextInputs to true
+ continueToCheckNextInputs = true;
+
+ var emailAddress = $("input#email-address").val();
+ if (emailAddress && !inputIsValidAgainstRegExp(/^[a-zA-Z0-9_.+-]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+$/, emailAddress)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Email Address is not valid.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+
+ if (continueToCheckNextInputs) {
+ var emailIncomingMailServerHostname = $("input#email-incoming-mail-server-hostname").val();
+ if (!emailIncomingMailServerHostname) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Incoming Mail Server Hostname is empty. You cannot proceed.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+
+ if (continueToCheckNextInputs) {
+ var emailIncomingMailServerPort = $("input#email-incoming-mail-server-port").val();
+ if (!emailIncomingMailServerPort) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Incoming Mail Server Port is empty. You cannot proceed.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (!$.isNumeric(emailIncomingMailServerPort)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Incoming Mail Server Port requires a number input.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (!inputIsValidAgainstRange(emailIncomingMailServerPort, 0, 65535)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Incoming Mail Server Port is not within the range " +
+ "of valid port numbers.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+
+ if (continueToCheckNextInputs) {
+ var emailOutgoingMailServerHostname = $("input#email-outgoing-mail-server-hostname").val();
+ if (!emailOutgoingMailServerHostname) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Outgoing Mail Server Hostname is empty. You cannot proceed.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+
+ if (continueToCheckNextInputs) {
+ var emailOutgoingMailServerPort = $("input#email-outgoing-mail-server-port").val();
+ if (!emailOutgoingMailServerPort) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Outgoing Mail Server Port is empty. You cannot proceed.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (!$.isNumeric(emailOutgoingMailServerPort)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Outgoing Mail Server Port requires a number input.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (!inputIsValidAgainstRange(emailOutgoingMailServerPort, 0, 65535)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Outgoing Mail Server Port is not within the range " +
+ "of valid port numbers.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+
+ // at-last, if the value of continueToCheckNextInputs is still true
+ // this means that no error is found
+ if (continueToCheckNextInputs) {
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ }
+
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ // Validating AIRPLAY
+ if ($.inArray(iosOperationConstants["AIRPLAY_OPERATION_CODE"], configuredOperations) != -1) {
+ // if AIRPLAY is configured
+ operation = iosOperationConstants["AIRPLAY_OPERATION"];
+ // initializing continueToCheckNextInputs to true
+ continueToCheckNextInputs = true;
+
+ var airplayCredentialsGridChildInputs = "div#airplay-credentials .child-input";
+ var airplayDestinationsGridChildInputs = "div#airplay-destinations .child-input";
+ if ($(airplayCredentialsGridChildInputs).length == 0 &&
+ $(airplayDestinationsGridChildInputs).length == 0) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "AirPlay settings have zero configurations attached.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+
+ if (continueToCheckNextInputs) {
+ if ($(airplayCredentialsGridChildInputs).length > 0) {
+ childInputCount = 0;
+ childInputArray = [];
+ emptyChildInputCount = 0;
+ duplicatesExist = false;
+ // looping through each child input
+ $(airplayCredentialsGridChildInputs).each(function () {
+ childInputCount++;
+ if (childInputCount % 2 == 1) {
+ // if child input is of first column
+ childInput = $(this).val();
+ childInputArray.push(childInput);
+ // updating emptyChildInputCount
+ if (!childInput) {
+ // if child input field is empty
+ emptyChildInputCount++;
+ }
+ }
+ });
+ // checking for duplicates
+ initialChildInputArrayLength = childInputArray.length;
+ if (emptyChildInputCount == 0 && initialChildInputArrayLength > 1) {
+ for (m = 0; m < (initialChildInputArrayLength - 1); m++) {
+ poppedChildInput = childInputArray.pop();
+ for (n = 0; n < childInputArray.length; n++) {
+ if (poppedChildInput == childInputArray[n]) {
+ duplicatesExist = true;
+ break;
+ }
+ }
+ if (duplicatesExist) {
+ break;
+ }
+ }
+ }
+ // updating validationStatus
+ if (emptyChildInputCount > 0) {
+ // if empty child inputs are present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more Device Names of " +
+ "AirPlay Credentials are empty.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (duplicatesExist) {
+ // if duplicate input is present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Duplicate values exist with " +
+ "Device Names of AirPlay Credentials.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+ }
+
+ if (continueToCheckNextInputs) {
+ if ($(airplayDestinationsGridChildInputs).length > 0) {
+ childInputArray = [];
+ emptyChildInputCount = 0;
+ invalidAgainstRegExCount = 0;
+ duplicatesExist = false;
+ // looping through each child input
+ $(airplayDestinationsGridChildInputs).each(function () {
+ childInput = $(this).val();
+ childInputArray.push(childInput);
+ // updating emptyChildInputCount
+ if (!childInput) {
+ // if child input field is empty
+ emptyChildInputCount++;
+ } else if (!inputIsValidAgainstRegExp(
+ /([a-z|A-Z|0-9][a-z|A-Z|0-9][:]){5}([a-z|A-Z|0-9][a-z|A-Z|0-9])$/, childInput)) {
+ // if child input field is invalid against RegEx
+ invalidAgainstRegExCount++
+ }
+ });
+ // checking for duplicates
+ initialChildInputArrayLength = childInputArray.length;
+ if (emptyChildInputCount == 0 && initialChildInputArrayLength > 1) {
+ for (m = 0; m < (initialChildInputArrayLength - 1); m++) {
+ poppedChildInput = childInputArray.pop();
+ for (n = 0; n < childInputArray.length; n++) {
+ if (poppedChildInput == childInputArray[n]) {
+ duplicatesExist = true;
+ break;
+ }
+ }
+ if (duplicatesExist) {
+ break;
+ }
+ }
+ }
+ // updating validationStatus
+ if (emptyChildInputCount > 0) {
+ // if empty child inputs are present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more AirPlay Destination fields are empty.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (invalidAgainstRegExCount > 0) {
+ // if invalidAgainstRegEx inputs are present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more AirPlay Destination fields " +
+ "do not fulfill expected format.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (duplicatesExist) {
+ // if duplicate input is present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Duplicate values exist with AirPlay Destinations.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+ }
+
+ // at-last, if the value of continueToCheckNextInputs is still true
+ // this means that no error is found
+ if (continueToCheckNextInputs) {
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ }
+
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ // Validating LDAP
+ if ($.inArray(iosOperationConstants["LDAP_OPERATION_CODE"], configuredOperations) != -1) {
+ // if LDAP is configured
+ operation = iosOperationConstants["LDAP_OPERATION"];
+ // initializing continueToCheckNextInputs to true
+ continueToCheckNextInputs = true;
+
+ var ldapAccountHostname = $("input#ldap-account-hostname").val();
+ if (!ldapAccountHostname) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "LDAP Account Hostname URL is empty. You cannot proceed.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+
+ if (continueToCheckNextInputs) {
+ var ldapSearchSettingsGridChildInputs = "div#ldap-search-settings .child-input";
+ if ($(ldapSearchSettingsGridChildInputs).length > 0) {
+ childInputCount = 0;
+ childInputArray = [];
+ emptyChildInputCount = 0;
+ duplicatesExist = false;
+ // looping through each child input
+ $(ldapSearchSettingsGridChildInputs).each(function () {
+ childInputCount++;
+ if (childInputCount % 3 == 2) {
+ // if child input is of second column
+ childInput = $(this).find("option:selected").attr("value");
+ stringPair = "";
+ stringPair += (childInput + " ");
+ } else if (childInputCount % 3 == 0) {
+ // if child input is of third column
+ childInput = $(this).val();
+ stringPair += childInput;
+ childInputArray.push(stringPair);
+ // updating emptyChildInputCount
+ if (!childInput) {
+ // if child input field is empty
+ emptyChildInputCount++;
+ }
+ }
+ });
+ // checking for duplicates
+ initialChildInputArrayLength = childInputArray.length;
+ if (emptyChildInputCount == 0 && initialChildInputArrayLength > 1) {
+ for (m = 0; m < (initialChildInputArrayLength - 1); m++) {
+ poppedChildInput = childInputArray.pop();
+ for (n = 0; n < childInputArray.length; n++) {
+ if (poppedChildInput == childInputArray[n]) {
+ duplicatesExist = true;
+ break;
+ }
+ }
+ if (duplicatesExist) {
+ break;
+ }
+ }
+ }
+ // updating validationStatus
+ if (emptyChildInputCount > 0) {
+ // if empty child inputs are present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more Search Setting Scope fields are empty.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (duplicatesExist) {
+ // if duplicate input is present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Duplicate values exist with " +
+ "Search Setting Search Base and Scope pairs.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+ }
+
+ // at-last, if the value of continueToCheckNextInputs is still true
+ // this means that no error is found
+ if (continueToCheckNextInputs) {
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ }
+
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ // Validating CALENDAR
+ if ($.inArray(iosOperationConstants["CALENDAR_OPERATION_CODE"], configuredOperations) != -1) {
+ // if CALENDAR is configured
+ operation = iosOperationConstants["CALENDAR_OPERATION"];
+ // initializing continueToCheckNextInputs to true
+ continueToCheckNextInputs = true;
+
+ var calendarAccountHostname = $("input#calendar-account-hostname").val();
+ if (!calendarAccountHostname) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Account Hostname URL is empty. You cannot proceed.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+
+ if (continueToCheckNextInputs) {
+ var calendarAccountPort = $("input#calendar-account-port").val();
+ if (!calendarAccountPort) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Account Port is empty. You cannot proceed.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (!$.isNumeric(calendarAccountPort)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Account Port requires a number input.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (!inputIsValidAgainstRange(calendarAccountPort, 0, 65535)) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Account Port is not within the range " +
+ "of valid port numbers.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+
+ // at-last, if the value of continueToCheckNextInputs is still true
+ // this means that no error is found
+ if (continueToCheckNextInputs) {
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ }
+
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ // Validating CALENDAR_SUBSCRIPTION
+ if ($.inArray(iosOperationConstants["CALENDAR_SUBSCRIPTION_OPERATION_CODE"], configuredOperations) != -1) {
+ // if CALENDAR_SUBSCRIPTION is configured
+ operation = iosOperationConstants["CALENDAR_SUBSCRIPTION_OPERATION"];
+ // initializing continueToCheckNextInputs to true
+ continueToCheckNextInputs = true;
+
+ var calendarSubscriptionHostname = $("input#calendar-subscription-hostname").val();
+ if (!calendarSubscriptionHostname) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Account Hostname URL is empty. You cannot proceed.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+
+ // at-last, if the value of continueToCheckNextInputs is still true
+ // this means that no error is found
+ if (continueToCheckNextInputs) {
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ }
+
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ // Validating APN
+ if ($.inArray(iosOperationConstants["APN_OPERATION_CODE"], configuredOperations) != -1) {
+ // if APN is configured
+ operation = iosOperationConstants["APN_OPERATION"];
+ // initializing continueToCheckNextInputs to true
+ continueToCheckNextInputs = true;
+
+ var apnConfigurationsGridChildInputs = "div#apn-configurations .child-input";
+ if ($(apnConfigurationsGridChildInputs).length == 0) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "APN Settings have zero configurations attached.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if ($(apnConfigurationsGridChildInputs).length > 0) {
+ childInputCount = 0;
+ childInputArray = [];
+ // checking empty APN field count
+ emptyChildInputCount = 0;
+ duplicatesExist = false;
+ // looping through each child input
+ $(apnConfigurationsGridChildInputs).each(function () {
+ childInputCount++;
+ if (childInputCount % 5 == 1) {
+ // if child input is of first column
+ childInput = $(this).val();
+ childInputArray.push(childInput);
+ // updating emptyChildInputCount
+ if (!childInput) {
+ // if child input field is empty
+ emptyChildInputCount++;
+ }
+ }
+ });
+ // checking for duplicates
+ initialChildInputArrayLength = childInputArray.length;
+ if (emptyChildInputCount == 0 && initialChildInputArrayLength > 1) {
+ for (m = 0; m < (initialChildInputArrayLength - 1); m++) {
+ poppedChildInput = childInputArray.pop();
+ for (n = 0; n < childInputArray.length; n++) {
+ if (poppedChildInput == childInputArray[n]) {
+ duplicatesExist = true;
+ break;
+ }
+ }
+ if (duplicatesExist) {
+ break;
+ }
+ }
+ }
+ // updating validationStatus
+ if (emptyChildInputCount > 0) {
+ // if empty child inputs are present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more APN fields of Configurations are empty.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (duplicatesExist) {
+ // if duplicate input is present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Duplicate values exist with " +
+ "APN fields of Configurations.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+
+ // at-last, if the value of continueToCheckNextInputs is still true
+ // this means that no error is found
+ if (continueToCheckNextInputs) {
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ }
+
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ // Validating CELLULAR
+ if ($.inArray(iosOperationConstants["CELLULAR_OPERATION_CODE"], configuredOperations) != -1) {
+ // if CELLULAR is configured
+ operation = iosOperationConstants["CELLULAR_OPERATION"];
+ // initializing continueToCheckNextInputs to true
+ continueToCheckNextInputs = true;
+
+ var cellularAttachAPNName = $("input#cellular-attach-apn-name").val();
+ if (!cellularAttachAPNName) {
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Cellular Configuration Name is empty. You cannot proceed.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+
+ if (continueToCheckNextInputs) {
+ var cellularAPNConfigurationsGridChildInputs = "div#cellular-apn-configurations .child-input";
+ if ($(cellularAPNConfigurationsGridChildInputs).length > 0) {
+ childInputCount = 0;
+ childInputArray = [];
+ // checking empty APN field count
+ emptyChildInputCount = 0;
+ duplicatesExist = false;
+ // looping through each child input
+ $(cellularAPNConfigurationsGridChildInputs).each(function () {
+ childInputCount++;
+ if (childInputCount % 6 == 1) {
+ // if child input is of first column
+ childInput = $(this).val();
+ childInputArray.push(childInput);
+ // updating emptyChildInputCount
+ if (!childInput) {
+ // if child input field is empty
+ emptyChildInputCount++;
+ }
+ }
+ });
+ // checking for duplicates
+ initialChildInputArrayLength = childInputArray.length;
+ if (emptyChildInputCount == 0 && initialChildInputArrayLength > 1) {
+ for (m = 0; m < (initialChildInputArrayLength - 1); m++) {
+ poppedChildInput = childInputArray.pop();
+ for (n = 0; n < childInputArray.length; n++) {
+ if (poppedChildInput == childInputArray[n]) {
+ duplicatesExist = true;
+ break;
+ }
+ }
+ if (duplicatesExist) {
+ break;
+ }
+ }
+ }
+ // updating validationStatus
+ if (emptyChildInputCount > 0) {
+ // if empty child inputs are present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "One or more APN fields of APN Configurations are empty.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ } else if (duplicatesExist) {
+ // if duplicate input is present
+ validationStatus = {
+ "error": true,
+ "subErrorMsg": "Duplicate values exist with " +
+ "APN fields of APN Configurations.",
+ "erroneousFeature": operation
+ };
+ continueToCheckNextInputs = false;
+ }
+ }
+ }
+
+ // at-last, if the value of continueToCheckNextInputs is still true
+ // this means that no error is found
+ if (continueToCheckNextInputs) {
+ validationStatus = {
+ "error": false,
+ "okFeature": operation
+ };
+ }
+
+ // updating validationStatusArray with validationStatus
+ validationStatusArray.push(validationStatus);
+ }
+ }
+ }
+ // ending validation process
+
+ // start taking specific notifying actions upon validation
+ var wizardIsToBeContinued;
+ var errorCount = 0;
+ var mainErrorMsgWrapper, mainErrorMsg,
+ subErrorMsgWrapper, subErrorMsg, subErrorIcon, subOkIcon, featureConfiguredIcon;
+ var i;
+ for (i = 0; i < validationStatusArray.length; i++) {
+ validationStatus = validationStatusArray[i];
+ if (validationStatus["error"]) {
+ errorCount++;
+ if (validationStatus["mainErrorMsg"]) {
+ mainErrorMsgWrapper = "#policy-profile-main-error-msg";
+ mainErrorMsg = mainErrorMsgWrapper + " span";
+ $(mainErrorMsg).text(validationStatus["mainErrorMsg"]);
+ $(mainErrorMsgWrapper).removeClass("hidden");
+ } else if (validationStatus["subErrorMsg"]) {
+ subErrorMsgWrapper = "#" + validationStatus["erroneousFeature"] + "-feature-error-msg";
+ subErrorMsg = subErrorMsgWrapper + " span";
+ subErrorIcon = "#" + validationStatus["erroneousFeature"] + "-error";
+ subOkIcon = "#" + validationStatus["erroneousFeature"] + "-ok";
+ featureConfiguredIcon = "#" + validationStatus["erroneousFeature"] + "-configured";
+ // hiding featureConfiguredState as the first step
+ if (!$(featureConfiguredIcon).hasClass("hidden")) {
+ $(featureConfiguredIcon).addClass("hidden");
+ }
+ // updating error state and corresponding messages
+ $(subErrorMsg).text(validationStatus["subErrorMsg"]);
+ if ($(subErrorMsgWrapper).hasClass("hidden")) {
+ $(subErrorMsgWrapper).removeClass("hidden");
+ }
+ if (!$(subOkIcon).hasClass("hidden")) {
+ $(subOkIcon).addClass("hidden");
+ }
+ if ($(subErrorIcon).hasClass("hidden")) {
+ $(subErrorIcon).removeClass("hidden");
+ }
+ }
+ } else {
+ if (validationStatus["okFeature"]) {
+ subErrorMsgWrapper = "#" + validationStatus["okFeature"] + "-feature-error-msg";
+ subErrorIcon = "#" + validationStatus["okFeature"] + "-error";
+ subOkIcon = "#" + validationStatus["okFeature"] + "-ok";
+ featureConfiguredIcon = "#" + validationStatus["okFeature"] + "-configured";
+ // hiding featureConfiguredState as the first step
+ if (!$(featureConfiguredIcon).hasClass("hidden")) {
+ $(featureConfiguredIcon).addClass("hidden");
+ }
+ // updating success state and corresponding messages
+ if (!$(subErrorMsgWrapper).hasClass("hidden")) {
+ $(subErrorMsgWrapper).addClass("hidden");
+ }
+ if (!$(subErrorIcon).hasClass("hidden")) {
+ $(subErrorIcon).addClass("hidden");
+ }
+ if ($(subOkIcon).hasClass("hidden")) {
+ $(subOkIcon).removeClass("hidden");
+ }
+ }
+ }
+ }
+
+ wizardIsToBeContinued = (errorCount == 0);
+ return wizardIsToBeContinued;
+};
+
+stepForwardFrom["policy-profile"] = function () {
+ policy["profile"] = operationModule.generateProfile(policy["platform"], configuredOperations);
+ // updating next-page wizard title with selected platform
+ $("#policy-criteria-page-wizard-title").text(policy["platform"] + " POLICY - " + policy["name"]);
+};
+
+stepForwardFrom["policy-criteria"] = function () {
+ $("input[type='radio'].select-users-radio").each(function () {
+ if ($(this).is(':radio')) {
+ if ($(this).is(":checked")) {
+ if ($(this).attr("id") == "users-radio-btn") {
+ policy["selectedUsers"] = $("#users-input").val();
+ } else if ($(this).attr("id") == "user-roles-radio-btn") {
+ policy["selectedUserRoles"] = $("#user-roles-input").val();
+ }
+ }
+ }
+ });
+ policy["selectedNonCompliantAction"] = $("#action-input").find(":selected").data("action");
+ policy["selectedOwnership"] = $("#ownership-input").val();
+ // updating next-page wizard title with selected platform
+ $("#policy-naming-page-wizard-title").text(policy["platform"] + " POLICY - " + policy["name"]);
+};
+
+/**
+ * Checks if provided input is valid against provided length range.
+ *
+ * @param input Alphanumeric or non-alphanumeric input
+ * @param minLength Minimum Required Length
+ * @param maxLength Maximum Required Length
+ * @returns {boolean} Returns true if input matches the provided minimum length and maximum length
+ */
+var inputIsValidAgainstLength = function (input, minLength, maxLength) {
+ var length = input.length;
+ return (length == minLength || (length > minLength && length < maxLength) || length == maxLength);
+};
+
+validateStep["policy-naming"] = function () {
+ var validationStatus = {};
+
+ // taking values of inputs to be validated
+ var policyName = $("input#policy-name-input").val();
+ // starting validation process and updating validationStatus
+ if (!policyName) {
+ validationStatus["error"] = true;
+ validationStatus["mainErrorMsg"] = "Policy name is empty. You cannot proceed.";
+ } else if (!inputIsValidAgainstLength(policyName, 1, 30)) {
+ validationStatus["error"] = true;
+ validationStatus["mainErrorMsg"] =
+ "Policy name exceeds maximum allowed length.";
+ } else {
+ validationStatus["error"] = false;
+ }
+ // ending validation process
+
+ // start taking specific actions upon validation
+ var wizardIsToBeContinued;
+ if (validationStatus["error"]) {
+ wizardIsToBeContinued = false;
+ var mainErrorMsgWrapper = "#policy-naming-main-error-msg";
+ var mainErrorMsg = mainErrorMsgWrapper + " span";
+ $(mainErrorMsg).text(validationStatus["mainErrorMsg"]);
+ $(mainErrorMsgWrapper).removeClass("hidden");
+ } else {
+ wizardIsToBeContinued = true;
+ }
+
+ return wizardIsToBeContinued;
+};
+
+validateStep["policy-naming-publish"] = function () {
+ var validationStatus = {};
+
+ // taking values of inputs to be validated
+ var policyName = $("input#policy-name-input").val();
+ // starting validation process and updating validationStatus
+ if (!policyName) {
+ validationStatus["error"] = true;
+ validationStatus["mainErrorMsg"] = "Policy name is empty. You cannot proceed.";
+ } else if (!inputIsValidAgainstLength(policyName, 1, 30)) {
+ validationStatus["error"] = true;
+ validationStatus["mainErrorMsg"] =
+ "Policy name exceeds maximum allowed length.";
+ } else {
+ validationStatus["error"] = false;
+ }
+ // ending validation process
+
+ // start taking specific actions upon validation
+ var wizardIsToBeContinued;
+ if (validationStatus["error"]) {
+ wizardIsToBeContinued = false;
+ var mainErrorMsgWrapper = "#policy-naming-main-error-msg";
+ var mainErrorMsg = mainErrorMsgWrapper + " span";
+ $(mainErrorMsg).text(validationStatus["mainErrorMsg"]);
+ $(mainErrorMsgWrapper).removeClass("hidden");
+ } else {
+ wizardIsToBeContinued = true;
+ }
+
+ return wizardIsToBeContinued;
+};
+
+stepForwardFrom["policy-naming-publish"] = function () {
+ policy["policyName"] = $("#policy-name-input").val();
+ policy["description"] = $("#policy-description-input").val();
+ //All data is collected. Policy can now be updated.
+ updatePolicy(policy, "publish");
+};
+stepForwardFrom["policy-naming"] = function () {
+ policy["policyName"] = $("#policy-name-input").val();
+ policy["description"] = $("#policy-description-input").val();
+ //All data is collected. Policy can now be updated.
+ updatePolicy(policy, "save");
+};
+
+var updatePolicy = function (policy, state) {
+ var profilePayloads = [];
+ // traverses key by key in policy["profile"]
+ var key;
+ for (key in policy["profile"]) {
+ if (policy["profile"].hasOwnProperty(key)) {
+ profilePayloads.push({
+ "featureCode": key,
+ "deviceType": policy["platform"],
+ "content": policy["profile"][key]
+ });
+ }
+ }
+ var payload = {
+ "policyName": policy["policyName"],
+ "description": policy["description"],
+ "compliance": policy["selectedNonCompliantAction"],
+ "ownershipType": policy["selectedOwnership"],
+ "profile": {
+ "profileName": policy["policyName"],
+ "deviceType": policy["platform"],
+ "profileFeaturesList": profilePayloads
+ }
+ };
+
+ if (policy["selectedUsers"]) {
+ payload["users"] = policy["selectedUsers"];
+ } else if (policy["selectedUserRoles"]) {
+ payload["roles"] = policy["selectedUserRoles"];
+ } else {
+ payload["users"] = [];
+ payload["roles"] = [];
+ }
+ //var serviceURL = baseApiUrl + "/policies/effective-policy/" + policy["platform"] + "/" + getParameterByName("id");
+
+ // role management
+ //set service url
+ //api/device-mgt/v1.0/ policy?........
+ var serviceURL = baseApiUrl + "/policy/effective-policy/" + policy["platform"] + "/" + getParameterByName("id");
+ invokerUtil.put(
+ serviceURL,
+ payload,
+ // on success
+ function () {
+ if (state == "save") {
+ var policyList = [];
+ policyList.push(getParameterByName("id"));
+ serviceURL = baseApiUrl + "/policies/deactivate-policy";
+ invokerUtil.post(
+ serviceURL,
+ policyList,
+ // on success
+ function () {
+ $(".policy-message").removeClass("hidden");
+ $(".add-policy").addClass("hidden");
+ },
+ // on error
+ function (data) {
+ console.log(data);
+ }
+ );
+ } else if (state == "publish") {
+ var policyList = [];
+ policyList.push(getParameterByName("id"));
+ serviceURL = baseApiUrl + "/policies/activate-policy";
+ invokerUtil.post(
+ serviceURL,
+ policyList,
+ // on success
+ function () {
+ $(".policy-message").removeClass("hidden");
+ $(".add-policy").addClass("hidden");
+ },
+ // on error
+ function (data) {
+ console.log(data);
+ }
+ );
+ }
+ },
+ // on error
+ function (data) {
+ console.log(data);
+ }
+ );
+};
+
+// Start of HTML embedded invoke methods
+var showAdvanceOperation = function (operation, button) {
+ $(button).addClass('selected');
+ $(button).siblings().removeClass('selected');
+ var hiddenOperation = ".wr-hidden-operations-content > div";
+ $(hiddenOperation + '[data-operation="' + operation + '"]').show();
+ $(hiddenOperation + '[data-operation="' + operation + '"]').siblings().hide();
+};
+
+/**
+ * Method to slide down a provided pane upon provided value set.
+ *
+ * @param selectElement Select HTML Element to consider
+ * @param paneID HTML ID of div element to slide down
+ * @param valueSet Applicable Value Set
+ */
+var slideDownPaneAgainstValueSet = function (selectElement, paneID, valueSet) {
+ var selectedValueOnChange = $(selectElement).find("option:selected").val();
+ if ($(selectElement).is("input:checkbox")) {
+ selectedValueOnChange = $(selectElement).is(":checked").toString();
+ }
+
+ var i, slideDownVotes = 0;
+ for (i = 0; i < valueSet.length; i++) {
+ if (selectedValueOnChange == valueSet[i]) {
+ slideDownVotes++;
+ }
+ }
+ var paneSelector = "#" + paneID;
+ if (slideDownVotes > 0) {
+ if (!$(paneSelector).hasClass("expanded")) {
+ $(paneSelector).addClass("expanded");
+ }
+ $(paneSelector).slideDown();
+ } else {
+ if ($(paneSelector).hasClass("expanded")) {
+ $(paneSelector).removeClass("expanded");
+ }
+ $(paneSelector).slideUp();
+ /* now follows the code to reinitialize all inputs of the slidable pane.
+ reinitializing input fields into the defaults.*/
+ $(paneSelector + " input").each(
+ function () {
+ if ($(this).is("input:text")) {
+ $(this).val($(this).data("default"));
+ } else if ($(this).is("input:password")) {
+ $(this).val("");
+ } else if ($(this).is("input:checkbox")) {
+ $(this).prop("checked", $(this).data("default"));
+ // if this checkbox is the parent input of a grouped-input
+ if ($(this).hasClass("parent-input")) {
+ var groupedInput = $(this).parent().parent().parent();
+ updateGroupedInputVisibility(groupedInput);
+ }
+ }
+ }
+ );
+ // reinitializing select fields into the defaults
+ $(paneSelector + " select").each(
+ function () {
+ var defaultOption = $(this).data("default");
+ $("option:eq(" + defaultOption + ")", this).prop("selected", "selected");
+ }
+ );
+ // collapsing expanded-panes (upon the selection of html-select-options) if any
+ $(paneSelector + " .expanded").each(
+ function () {
+ if ($(this).hasClass("expanded")) {
+ $(this).removeClass("expanded");
+ }
+ $(this).slideUp();
+ }
+ );
+ // removing all entries of grid-input elements if exist
+ $(paneSelector + " .grouped-array-input").each(
+ function () {
+ var gridInputs = $(this).find("[data-add-form-clone]");
+ if (gridInputs.length > 0) {
+ gridInputs.remove();
+ }
+ var helpTexts = $(this).find("[data-help-text=add-form]");
+ if (helpTexts.length > 0) {
+ helpTexts.show();
+ }
+ }
+ );
+ }
+};
+
+var slideDownPaneAgainstValueSetForRadioButtons = function (selectElement, paneID, valueSet) {
+ var selectedValueOnChange = selectElement.value;
+
+ var i, slideDownVotes = 0;
+ for (i = 0; i < valueSet.length; i++) {
+ if (selectedValueOnChange == valueSet[i]) {
+ slideDownVotes++;
+ }
+ }
+
+ var paneSelector = "#" + paneID;
+ if(slideDownVotes > 0) {
+ $(paneSelector).removeClass("hidden");
+ } else {
+ $(paneSelector).addClass("hidden");
+ }
+};
+// End of HTML embedded invoke methods
+
+
+// Start of functions related to grid-input-view
+
+/**
+ * Method to set count id to cloned elements.
+ * @param {object} addFormContainer
+ */
+var setId = function (addFormContainer) {
+ $(addFormContainer).find("[data-add-form-clone]").each(function (i) {
+ $(this).attr("id", $(this).attr("data-add-form-clone").slice(1) + "-" + (i + 1));
+ if ($(this).find(".index").length > 0) {
+ $(this).find(".index").html(i + 1);
+ }
+ });
+};
+
+/**
+ * Method to set count id to cloned elements.
+ * @param {object} addFormContainer
+ */
+var showHideHelpText = function (addFormContainer) {
+ var helpText = "[data-help-text=add-form]";
+ if ($(addFormContainer).find("[data-add-form-clone]").length > 0) {
+ $(addFormContainer).find(helpText).hide();
+ } else {
+ $(addFormContainer).find(helpText).show();
+ }
+};
+
+/**
+ * This method will display appropriate fields based on wifi type
+ * @param {object} wifi type select object
+ */
+var changeAndroidWifiPolicy = function (select) {
+ slideDownPaneAgainstValueSet(select, 'control-wifi-password', ['wep', 'wpa', '802eap']);
+ slideDownPaneAgainstValueSet(select, 'control-wifi-eap', ['802eap']);
+ slideDownPaneAgainstValueSet(select, 'control-wifi-phase2', ['802eap']);
+ slideDownPaneAgainstValueSet(select, 'control-wifi-identity', ['802eap']);
+ slideDownPaneAgainstValueSet(select, 'control-wifi-anoidentity', ['802eap']);
+ slideDownPaneAgainstValueSet(select, 'control-wifi-cacert', ['802eap']);
+};
+
+/**
+ * This method will display appropriate fields based on wifi EAP type
+ * @param {object} wifi eap select object
+ * @param {object} wifi type select object
+ */
+var changeAndroidWifiPolicyEAP = function (select, superSelect) {
+ slideDownPaneAgainstValueSet(select, 'control-wifi-password', ['peap', 'ttls', 'pwd' , 'fast', 'leap']);
+ slideDownPaneAgainstValueSet(select, 'control-wifi-phase2', ['peap', 'ttls', 'fast']);
+ slideDownPaneAgainstValueSet(select, 'control-wifi-provisioning', ['fast']);
+ slideDownPaneAgainstValueSet(select, 'control-wifi-identity', ['peap', 'tls', 'ttls', 'pwd', 'fast', 'leap']);
+ slideDownPaneAgainstValueSet(select, 'control-wifi-anoidentity', ['peap', 'ttls']);
+ slideDownPaneAgainstValueSet(select, 'control-wifi-cacert', ['peap', 'tls', 'ttls']);
+ if (superSelect.value != '802eap') {
+ changeAndroidWifiPolicy(superSelect);
+ }
+};
+
+// End of functions related to grid-input-view
+
+/**
+ * This method will return query parameter value given its name.
+ * @param name Query parameter name
+ * @returns {string} Query parameter value
+ */
+var getParameterByName = function (name) {
+ name = name.replace(/[\[]/, "\\[").replace(/[\]]/, "\\]");
+ var regex = new RegExp("[\\?&]" + name + "=([^]*)"),
+ results = regex.exec(location.search);
+ return results === null ? "" : decodeURIComponent(results[1].replace(/\+/g, " "));
+};
+
+$(document).ready(function () {
+ $('#appbar-btn-apply-changes').addClass('hidden');
+ // Adding initial state of wizard-steps.
+ $("#policy-profile-wizard-steps").html($(".wr-steps").html());
+
+ var policyPayloadObj;
+ invokerUtil.get(
+ // baseApiUrl + "/policies/" + getParameterByName("id"),
+
+
+ baseApiUrl + "/policies/effective-policy/" + getParameterByName("type") + "/" + getParameterByName("id"),
+ // on success
+ function (data, textStatus, jqXHR) {
+ if (jqXHR.status == 200 && data) {
+ policyPayloadObj = JSON.parse(data);
+ skipStep["policy-platform"](policyPayloadObj);
+ }
+ },
+ // on error
+ function (jqXHR) {
+ console.log(jqXHR);
+ // should be redirected to an error page
+ }
+ );
+
+ $("select.select2[multiple=multiple]").select2({
+ "tags": true
+ });
+
+ $("#users-select-field").hide();
+ $("#user-roles-select-field").show();
+
+ $("input[type='radio'].select-users-radio").change(function () {
+ if ($("#users-radio-btn").is(":checked")) {
+ $("#user-roles-select-field").hide();
+ $("#users-select-field").show();
+ }
+ if ($("#user-roles-radio-btn").is(":checked")) {
+ $("#users-select-field").hide();
+ $("#user-roles-select-field").show();
+ }
+ });
+
+ // Support for special input type "ANY" on user(s) & user-role(s) selection
+ $("#users-input, #user-roles-input").select2({
+ "tags": true
+ }).on("select2:select", function (e) {
+ if (e.params.data.id == "ANY") {
+ $(this).val("ANY").trigger("change");
+ } else {
+ $("option[value=ANY]", this).prop("selected", false).parent().trigger("change");
+ }
+ });
+
+ // Maintains an array of configured features of the profile
+ var advanceOperations = ".wr-advance-operations";
+ $(advanceOperations).on("click", ".wr-input-control.switch", function (event) {
+ var operationCode = $(this).parents(".operation-data").data("operation-code");
+ var operation = $(this).parents(".operation-data").data("operation");
+ var operationDataWrapper = $(this).data("target");
+ // prevents event bubbling by figuring out what element it's being called from.
+ if (event.target.tagName == "INPUT") {
+ var featureConfiguredIcon;
+ if ($("input[type='checkbox']", this).is(":checked")) {
+ configuredOperations.push(operationCode);
+ // when a feature is enabled, if "zero-configured-features" msg is available, hide that.
+ var zeroConfiguredOperationsErrorMsg = "#policy-profile-main-error-msg";
+ if (!$(zeroConfiguredOperationsErrorMsg).hasClass("hidden")) {
+ $(zeroConfiguredOperationsErrorMsg).addClass("hidden");
+ }
+ // add configured-state-icon to the feature
+ featureConfiguredIcon = "#" + operation + "-configured";
+ if ($(featureConfiguredIcon).hasClass("hidden")) {
+ $(featureConfiguredIcon).removeClass("hidden");
+ }
+ } else {
+ //splicing the array if operation is present.
+ var index = $.inArray(operationCode, configuredOperations);
+ if (index != -1) {
+ configuredOperations.splice(index, 1);
+ }
+ // when a feature is disabled, clearing all its current configured, error or success states
+ var subErrorMsgWrapper = "#" + operation + "-feature-error-msg";
+ var subErrorIcon = "#" + operation + "-error";
+ var subOkIcon = "#" + operation + "-ok";
+ featureConfiguredIcon = "#" + operation + "-configured";
+
+ if (!$(subErrorMsgWrapper).hasClass("hidden")) {
+ $(subErrorMsgWrapper).addClass("hidden");
+ }
+ if (!$(subErrorIcon).hasClass("hidden")) {
+ $(subErrorIcon).addClass("hidden");
+ }
+ if (!$(subOkIcon).hasClass("hidden")) {
+ $(subOkIcon).addClass("hidden");
+ }
+ if (!$(featureConfiguredIcon).hasClass("hidden")) {
+ $(featureConfiguredIcon).addClass("hidden");
+ }
+ // reinitializing input fields into the defaults
+ $(operationDataWrapper + " input").each(
+ function () {
+ if ($(this).is("input:text")) {
+ $(this).val($(this).data("default"));
+ } else if ($(this).is("input:password")) {
+ $(this).val("");
+ } else if ($(this).is("input:checkbox")) {
+ $(this).prop("checked", $(this).data("default"));
+ // if this checkbox is the parent input of a grouped-input
+ if ($(this).hasClass("parent-input")) {
+ var groupedInput = $(this).parent().parent().parent();
+ updateGroupedInputVisibility(groupedInput);
+ }
+ }
+ }
+ );
+ // reinitializing select fields into the defaults
+ $(operationDataWrapper + " select").each(
+ function () {
+ var defaultOption = $(this).data("default");
+ $("option:eq(" + defaultOption + ")", this).prop("selected", "selected");
+ }
+ );
+ // collapsing expanded-panes (upon the selection of html-select-options) if any
+ $(operationDataWrapper + " .expanded").each(
+ function () {
+ if ($(this).hasClass("expanded")) {
+ $(this).removeClass("expanded");
+ }
+ $(this).slideUp();
+ }
+ );
+ // removing all entries of grid-input elements if exist
+ $(operationDataWrapper + " .grouped-array-input").each(
+ function () {
+ var gridInputs = $(this).find("[data-add-form-clone]");
+ if (gridInputs.length > 0) {
+ gridInputs.remove();
+ }
+ var helpTexts = $(this).find("[data-help-text=add-form]");
+ if (helpTexts.length > 0) {
+ helpTexts.show();
+ }
+ }
+ );
+ }
+ }
+ });
+
+ // adding support for cloning multiple profiles per feature with cloneable class definitions
+ $(advanceOperations).on("click", ".multi-view.add.enabled", function () {
+ // get a copy of .cloneable and create new .cloned div element
+ var cloned = "
" + $(".cloneable", $(this).parent().parent()).html() + "";
+ // append newly created .cloned div element to panel-body
+ $(this).parent().parent().append(cloned);
+ // enable remove action of newly cloned div element
+ $(".cloned", $(this).parent().parent()).each(
+ function () {
+ if ($(".multi-view.remove", this).hasClass("disabled")) {
+ $(".multi-view.remove", this).removeClass("disabled");
+ }
+ if (!$(".multi-view.remove", this).hasClass("enabled")) {
+ $(".multi-view.remove", this).addClass("enabled");
+ }
+ }
+ );
+ });
+
+ $(advanceOperations).on("click", ".multi-view.remove.enabled", function () {
+ $(this).parent().remove();
+ });
+
+ // enabling or disabling grouped-input based on the status of a parent check-box
+ $(advanceOperations).on("click", ".grouped-input", function () {
+ updateGroupedInputVisibility(this);
+ });
+
+ // add form entry click function for grid inputs
+ $(advanceOperations).on("click", "[data-click-event=add-form]", function () {
+ var addFormContainer = $("[data-add-form-container=" + $(this).attr("href") + "]");
+ var clonedForm = $("[data-add-form=" + $(this).attr("href") + "]").clone().
+ find("[data-add-form-element=clone]").attr("data-add-form-clone", $(this).attr("href"));
+
+ // adding class .child-input to capture text-input-array-values
+ $("input, select", clonedForm).addClass("child-input");
+
+ $(addFormContainer).append(clonedForm);
+ setId(addFormContainer);
+ showHideHelpText(addFormContainer);
+ });
+
+ // remove form entry click function for grid inputs
+ $(advanceOperations).on("click", "[data-click-event=remove-form]", function () {
+ var addFormContainer = $("[data-add-form-container=" + $(this).attr("href") + "]");
+
+ $(this).closest("[data-add-form-element=clone]").remove();
+ setId(addFormContainer);
+ showHideHelpText(addFormContainer);
+ });
+
+ $(".wizard-stepper").click(function () {
+ // button clicked here can be either a continue button or a back button.
+ var currentStep = $(this).data("current");
+ var validationIsRequired = $(this).data("validate");
+ var wizardIsToBeContinued;
+
+ if (validationIsRequired) {
+ wizardIsToBeContinued = validateStep[currentStep]();
+ } else {
+ wizardIsToBeContinued = true;
+ }
+
+ if (wizardIsToBeContinued) {
+ // When moving back and forth, following code segment will
+ // remove if there are any visible error-messages.
+ var errorMsgWrappers = ".alert.alert-danger";
+ $(errorMsgWrappers).each(
+ function () {
+ if (!$(this).hasClass("hidden")) {
+ $(this).addClass("hidden");
+ }
+ }
+ );
+
+ var nextStep = $(this).data("next");
+ var isBackBtn = $(this).data("is-back-btn");
+
+ // if current button is a continuation...
+ if (!isBackBtn) {
+ // initiate stepForwardFrom[*] functions to gather form data.
+ if (stepForwardFrom[currentStep]) {
+ stepForwardFrom[currentStep](this);
+ }
+ } else {
+ // initiate stepBackFrom[*] functions to rollback.
+ if (stepBackFrom[currentStep]) {
+ stepBackFrom[currentStep]();
+ }
+ }
+
+ // following step occurs only at the last stage of the wizard.
+ if (!nextStep) {
+ window.location.href = $(this).data("direct");
+ }
+
+ // updating next wizard step as current.
+ $(".itm-wiz").each(function () {
+ var step = $(this).data("step");
+ if (step == nextStep) {
+ $(this).addClass("itm-wiz-current");
+ } else {
+ $(this).removeClass("itm-wiz-current");
+ }
+ });
+
+ // adding next update of wizard-steps.
+ $("#" + nextStep + "-wizard-steps").html($(".wr-steps").html());
+
+ // hiding current section of the wizard and showing next section.
+ $("." + currentStep).addClass("hidden");
+ $("." + nextStep).removeClass("hidden");
+ }
+ });
+});
diff --git a/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/public/templates/hidden-operations-android.hbs b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/public/templates/hidden-operations-android.hbs
new file mode 100644
index 0000000000..2017870949
--- /dev/null
+++ b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/public/templates/hidden-operations-android.hbs
@@ -0,0 +1,1493 @@
+
+
+
+
+
+
+
+
+
+ Passcode Policy
+
+
+
+
+
+
+
+ This configuration can be used to set a passcode policy to an Android Device.
+ Once this configuration profile is installed on a device, corresponding users will not be able
+ to modify these settings on their devices.
+
+
+
+
+
+
+
+
+
+
+
+
+ Allow simple value
+
+
+
+
+
+
+
+
+
+ Require alphanumeric value
+
+
+
+
+
+
+
+ Minimum passcode length
+
+
+
+
+
+
+ None
+
+ 04
+ 05
+ 06
+ 07
+ 08
+ 09
+ 10
+ 11
+ 12
+ 13
+ 14
+ 15
+
+
+
+
+
+ Minimum number of complex characters
+
+
+
+
+
+
+ None
+
+ 01
+ 02
+ 03
+ 04
+ 05
+
+
+
+
+
+ Maximum passcode age in days
+
+
+
+
+ ( Should be in between 1-to-730 days or none )
+
+
+
+
+
+
+ Passcode history
+
+
+
+
+ ( Should be in between 1-to-50 passcodes or none )
+
+
+
+
+
+
+ Maximum number of failed attempts
+
+
+
+
+
+
+ None
+
+ 03
+ 04
+ 05
+ 06
+ 07
+ 08
+ 09
+ 10
+
+
+
+
+
+
+
+
+
+
+
+
+ Restrictions
+
+
+
+
+
+
+
+ This configurations can be used to restrict certain settings on an Android device.
+ Once this configuration profile is installed on a device, corresponding users will not be able
+ to modify these settings on their devices.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Allow use of camera
+
+
+
+
+
+ Bellow restrictions will be applied on devices with Android version 5.0 Lollipop onwards only
+
+
+
+
+
+
+ Disallow volume adjust
+
+
+
+
+
+
+
+
+
+
+ Disallow configuring bluetooth.
+
+
+
+
+
+
+
+
+
+
+ Disallow cell broadcast
+
+
+
+
+
+
+
+
+
+
+ Disallow configuring credentials
+
+
+
+
+
+
+
+
+
+
+ Disallow configuring mobile networks
+
+
+
+
+
+
+
+
+
+
+ Disallow configuring tethering
+
+
+
+
+
+
+
+
+
+
+ Disallow configuring VPN
+
+
+
+
+
+
+
+
+
+
+ Disallow configuring Wifi
+
+
+
+
+
+
+
+
+
+
+ Disallow configuring app control
+
+
+
+
+
+
+
+
+
+
+ Disallow create window
+
+
+
+
+
+
+
+
+
+
+ Disallow cross profile copy paste
+
+
+
+
+
+
+
+
+
+
+ Disallow debuging
+
+
+
+
+
+
+
+
+
+
+ Disallow factory reset
+
+
+
+
+
+
+
+
+
+
+ Disallow add user
+
+
+
+
+
+
+
+
+
+
+ Disallow install apps
+
+
+
+
+
+
+
+
+
+
+ Disallow install from unknown sources
+
+
+
+
+
+
+
+
+
+
+ Disallow modify accounts
+
+
+
+
+
+
+
+
+
+
+ Disallow mount physical media
+
+
+
+
+
+
+
+
+
+
+ Disallow network reset
+
+
+
+
+
+
+
+
+
+
+ Disallow outgoing beam
+
+
+
+
+
+
+
+
+
+
+ Disallow outgoing calls
+
+
+
+
+
+
+
+
+
+
+ Disallow remove user
+
+
+
+
+
+
+
+
+
+
+ Disallow safe boot
+
+
+
+
+
+
+
+
+
+
+ Disallow location sharing
+
+
+
+
+
+
+
+
+
+
+ Disallow SMS
+
+
+
+
+
+
+
+
+
+
+ Disallow uninstall apps
+
+
+
+
+
+
+
+
+
+
+ Disallow unmute microphone
+
+
+
+
+
+
+
+
+
+
+ Disallow USB file transfer
+
+
+
+
+
+
+
+
+
+
+ Disallow parent profile app linking
+
+
+
+
+
+
+
+
+
+
+ Ensure verifying apps
+
+
+
+
+
+
+
+
+
+
+ Enable auto timing
+
+
+
+
+
+
+
+
+
+
+ Disable screen capture
+
+
+
+
+
+
+ Bellow restrictions will be applied on devices with Android version 6.0 Marshmallow onwards only.
+
+
+
+
+
+
+ Disable status bar
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Encryption Settings
+
+
+
+
+
+
+
+ This configuration can be used to encrypt data on an Android device, when the device is locked and
+ make it readable when the passcode is entered. Once this configuration profile is installed on a device,
+ corresponding users will not be able to modify these settings on their devices.
+
+
+
+
+
+
+
+ Un-check following checkbox in case you do not need the device to be encrypted.
+
+
+
+
+
+
+ Enable storage-encryption
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Wi-Fi Settings
+
+
+
+
+
+
+
+ This configurations can be used to configure Wi-Fi access on an Android device.
+ Once this configuration profile is installed on a device, corresponding users will not be able
+ to modify these settings on their devices.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Please note that * sign represents required fields of data.
+
+
+
+
+
+
+
+ Service Set Identifier (SSID) *
+
+
+
+
+ ( should be 1-to-30 characters long )
+
+
+
+
+
+ Security*
+
+
+
+
+
+ None
+ WEP
+ WPA/WPA 2 PSK
+ 802.1x EAP
+
+
+
+
+
+ EAP Method
+
+
+
+
+
+ PEAP
+ TLS
+ TTLS
+ PWD
+ SIM
+ AKA
+
+
+
+
+ Phase 2 Authentication
+
+
+
+
+
+ None
+ PAP
+ MCHAP
+ MCHAPV2
+ GTC
+
+
+
+
+ Provisioning
+
+
+
+
+
+ 0
+ 1
+ 2
+ 3
+
+
+
+
+ Identity
+
+
+
+
+
+ Identity should be 1-to-30 characters long
+
+
+
+
+
+ Anonymous Identity
+
+
+
+
+
+ Anonymous Identity should be 1-to-30 characters long
+
+
+
+
+
+ Password*
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Application Restriction Settings
+
+
+
+
+
+
+
+ This configuration can be used to create a black list or white list of applications.
+
+
+
+
+
+
+
+
+
+
+ None
+
+ Black List
+ White List
+
+
+
+
+
+
+
+
+
+
+
+
+
+ VPN Settings
+
+
+
+
+
+
+
+ This configurations can be used to configure VPN settings on an Android device.
+ Once this configuration profile is installed on a device, corresponding users will not be able
+ to modify these settings on their devices.
+
+
+
+
+ Please note that * sign represents required fields of data.
+
+
+
+
+
+
+
+ VPN Server Address*
+
+
+
+
+
+
+
+
+ VPN Server Port
+
+
+
+
+
+
+
+
+ Shared Secret
+
+
+
+
+
+
+
+
+ DNS Server
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Work-Profile Configurations
+
+
+
+
+
+
+
+ The configurations below can be applied to the devices where the agent is running in Android Work-Profile.
+
+
+
+
+
+
+
+
+
+
+
+ Profile Name
+
+
+
+
+
+
+
+
+
+ Enable System Apps
+
+
+
+
+ ( Should be exact package names seperated by commas. Ex: com.google.android.apps.maps, com.google.android.calculator )
+
+
+
+
+
+ Hide System Apps
+
+
+
+
+ ( Should be exact package names seperated by commas. Ex: com.google.android.apps.maps, com.google.android.calculator )
+
+
+
+
+
+ Unhide System Apps
+
+
+
+
+ ( Should be exact package names seperated by commas. Ex: com.google.android.apps.maps, com.google.android.calculator )
+
+
+
+
+
+ Enable Google Play Store Apps
+
+
+
+
+ ( Should be exact package names seperated by commas. Ex: com.google.android.apps.maps, com.google.android.calculator )
+
+
+
+
+
+
+
+
+
+
+
+
+ System Update Policy (COSU)
+
+
+
+
+
+
+
+ This configuration can be used to set system update policy to an Android Device in COSU.
+ Once this configuration profile is installed on a device, corresponding users will not be
+ able
+ to modify these settings on their devices.
+
+
+
+
+
+
+
+
+
+
+
+
+ System Update
+
+
+
+
+
+
+
+
+ Automatic
+
+
+
+
+
+ Postpone
+
+
+
+
+
+ Window
+
+
+
+
+
+
+
+
+ Start Time
+
+
+
+
+
+ 12 AM
+ 1 AM
+ 2 AM
+ 3 AM
+ 4 AM
+ 5 AM
+ 6 AM
+ 7 AM
+ 8 AM
+ 9 AM
+ 10 AM
+ 11 AM
+ 12 noon
+ 1 PM
+ 2 PM
+ 3 PM
+ 4 PM
+ 5 PM
+ 6 PM
+ 7 PM
+ 8 PM
+ 9 PM
+ 10 PM
+ 11 PM
+
+
+
+
+ End Time
+
+
+
+
+
+ 12 AM
+ 1 AM
+ 2 AM
+ 3 AM
+ 4 AM
+ 5 AM
+ 6 AM
+ 7 AM
+ 8 AM
+ 9 AM
+ 10 AM
+ 11 AM
+ 12 Noon
+ 1 PM
+ 2 PM
+ 3 PM
+ 4 PM
+ 5 PM
+ 6 PM
+ 7 PM
+ 8 PM
+ 9 PM
+ 10 PM
+ 11 PM
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Whitelist Applications (COSU)
+
+
+
+
+
+
+
+ This configuration can be used to whitelist applications in lock task mode of an Android Device in COSU.
+ Once this configuration profile is installed on a device, corresponding users will not be
+ able
+ to modify these settings on their devices.
+
+
+
+
+
+
+
+
+
diff --git a/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/public/templates/hidden-operations-ios.hbs b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/public/templates/hidden-operations-ios.hbs
new file mode 100644
index 0000000000..37a776b6f8
--- /dev/null
+++ b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/public/templates/hidden-operations-ios.hbs
@@ -0,0 +1,4728 @@
+
+
+
+
+
+
+
+
+
+ Passcode Policy
+
+
+
+
+
+
+
+ This configuration can be used to set a passcode policy to an iOS Device.
+ Once this configuration profile is installed on a device, corresponding users
+ will not be able
+ to modify these settings on their devices.
+
+
+
+
+
+
+
+
+
+
+
+
+ Force Passcode
+
+
+
+
+
+
+
+
+
+ Allow simple value
+
+
+
+
+
+
+
+
+
+ Require alphanumeric value
+
+
+
+
+
+
+
+ Minimum passcode length
+
+
+
+
+
+
+ None
+
+ 01
+ 02
+ 03
+ 04
+ 05
+ 06
+ 07
+ 08
+ 09
+ 10
+ 11
+ 12
+ 13
+ 14
+ 15
+ 16
+
+
+
+
+
+ Minimum number of complex characters
+
+
+
+
+
+
+ None
+
+ 01
+ 02
+ 03
+ 04
+
+
+
+
+
+ Maximum passcode age in days
+ ( Should be in between 1-to-730 days or none )
+
+
+
+
+
+
+
+
+
+ Passcode history
+ ( Should be in between 1-to-50 passcodes or none )
+
+
+
+
+
+
+
+
+
+ Auto Lock Time in minutes
+
+
+
+
+
+
+ None
+
+ 01
+ 02
+ 03
+ 04
+ 05
+
+
+
+
+
+ Grace period in minutes for device lock
+
+
+
+
+
+
+ None
+
+ Immediately
+ 01
+ 05
+ 10
+ 15
+ 30
+ 60
+
+
+
+
+
+ Maximum number of failed attempts
+
+
+
+
+
+
+ None
+
+ 03
+ 04
+ 05
+ 06
+ 07
+ 08
+ 09
+ 10
+
+
+
+
+
+
+
+
+
+
+
+
+ VPN Settings
+
+
+
+
+
+
+
+ This configurations can be used to configure VPN settings on an iOS device.
+ Once this configuration profile is installed on a device, corresponding users will not
+ be able
+ to modify these settings on their devices.
+
+
+
+
+Please note that * sign represents required fields of data.
+
+
+
+
+
+
+
+
+ Connection Name*
+
+
+
+
+
+
+
+
+
+
+ Override Primary
+
+
+
+
+
+
+
+
+ On-demand Enabled
+
+
+
+
+
+
+
+
+ VPN Type*
+
+
+
+
+
+ PPTP
+ L2TP
+ IPSec
+ IKEv2
+
+
+
+ For PPTP Configuration :
+
+
+
+
+
+ VPN Account Username*
+
+
+
+
+
+
+
+
+
+
+ Token Card Enabled
+
+
+
+
+
+
+
+ VPN Account Password
+
+
+
+
+
+
+
+
+
+ Comm Remote Address*
+
+
+
+
+
+
+
+
+
+
+ RSA SecureID Enabled
+
+
+
+
+
+
+
+
+ CCP Encryption Enabled
+
+
+
+
+
+
+
+ For L2TP Configuration :
+
+
+
+
+
+ VPN Account Username*
+
+
+
+
+
+
+
+
+
+
+ Token Card Enabled
+
+
+
+
+
+
+
+ VPN Account Password
+
+
+
+
+
+
+
+
+
+ Comm Remote Address*
+
+
+
+
+
+
+
+
+
+
+ RSA SecureID Enabled
+
+
+
+
+
+
+ For IPSec Configuration :
+
+
+
+
+
+ Remote Address*
+
+
+
+
+
+
+
+
+ Authentication Method*
+
+
+
+
+
+ Shared Secret
+ Certificate
+
+
+
+
+
+
+ Payload Certificate UUID*
+
+
+
+
+
+
+
+
+
+
+
+ XAuth Enabled
+
+
+
+
+
+
+
+ XAuth Name*
+
+
+
+
+
+
+
+
+
+
+
+ Prompt for VPN PIN
+
+
+
+
+
+
+ For IKEv2 Configuration :
+
+
+
+
+
+ Remote Address*
+
+
+
+
+
+
+
+
+ Local Identifier*
+
+
+
+
+
+ FQDN
+ User FQDN
+ Address
+ ASN1DN
+
+
+
+
+ Remote Identifier*
+
+
+
+
+
+ FQDN
+ User FQDN
+ Address
+ ASN1DN
+
+
+
+
+ Authentication Method*
+
+
+
+
+
+ Shared Secret
+ Certificate
+
+
+
+
+
+ Shared Secret*
+
+
+
+
+
+
+
+
+
+
+ Payload Certificate UUID*
+
+
+
+
+
+
+
+
+
+
+
+ Extended Authentication Enabled
+
+
+
+
+
+
+
+ Dead Peer Detection Interval
+
+
+
+
+
+ None
+ Low
+ Medium
+ High
+
+
+
+
+ Server Certificate Issuer Common Name
+
+
+
+
+
+
+
+
+ Server Certificate Common Name
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Per App VPN Settings
+
+
+
+
+
+
+
+ This configuration can be used to configure add-on VPN software (per-app VPN),
+ and it works only on VPN services of
+ type 'VPN'. Once this configuration profile is installed on a device,
+ corresponding users will not be able
+ to modify these settings on their devices.
+
+
+
+
+ Please note that * sign represents required fields of data.
+
+
+
+
+
+
+
+
+ VPNUUID*
+
+
+
+
+
+
+
+
+
+
+ On Demand Match App Enabled
+
+
+
+
+
+
+
+
+
+
+ App-to-Per-App VPN Mapping
+
+
+
+
+
+
+
+ This configuration can be used to configure app-to-per-app VPN mappings.
+ Once this configuration profile is installed on a device, corresponding users will
+ not be able
+ to modify these settings on their devices.
+
+
+
+
+ Please note that * sign represents required fields of data.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Application Restriction Settings
+
+
+
+
+
+
+
+ This configuration can be used to create a black list or white list of
+ applications.
+
+
+
+
+
+
+
+
+
+
+ None
+
+ Black List
+ White List
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Wi-Fi Settings
+
+
+
+
+
+
+
+ These configurations can be used to set how devices connect to your wireless network(s),
+ including the necessary authentication
+ information. Once this configuration profile is installed on an iOS device,
+ corresponding users will not be able
+ to modify these settings on their devices.
+
+
+
+
+
+
+
+
+
+
+ Service Set Identifier (SSID)
+
+
+
+
+
+
+
+
+
+ Domain Name
+
+
+
+
+ ( For Wi-Fi Hotspot 2.0 negotiation )
+
+
+
+
+
+
+
+
+ Hidden Network
+
+
+
+
+
+
+
+
+
+ Hot Spot
+
+
+
+
+
+
+
+
+
+ Enable Service Provider Roaming
+
+
+
+
+
+
+
+
+
+ Auto Join
+
+
+
+
+
+
+
+ Displayed Operator Name
+
+
+
+
+
+
+
+
+
+ Proxy Setup
+
+
+
+
+
+
+ None
+
+ Manual
+ Automatic
+
+
+
+
+
+
+
+ Encryption Security Type
+
+
+
+
+
+ None
+ WEP
+ WPA
+ ANY
+
+
+
+
+
+For WEP, WPA or ANY Encryption Security Type :
+
+
+
+
+
+ Wi-Fi Password
+
+
+
+
+
+
+
+
+
+EAP Client Configuration ( Optional ) :
+
+
+
+
+
+
+
+ Username
+
+
+
+
+
+
+
+
+
+ Password
+
+
+
+
+
+
+
+
+
+
+
+ One Time Password
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Allow TLS Trust Exceptions
+
+
+
+
+
+
+
+
+
+ Require TLS Certificate
+
+
+
+
+
+
+
+ TTLS Inner Authentication Type
+
+
+
+
+
+ PAP
+ CHAP
+ MSCHAP
+ MSCHAPv2
+
+
+
+
+
+ Outer Identity
+
+
+
+
+ ( Only relevant to TTLS, PEAP and EAP-FAST )
+
+
+
+
+EAP-Fast Support :
+
+
+
+
+
+
+
+ Number of expected RANDs for EAP-SIM
+
+
+
+
+
+ 2
+ 3
+
+
+
+
+
+
+
+ Certificate Payload UUID
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Email Settings
+
+
+
+
+
+
+
+ These configurations can be used to define settings for connecting
+ to your POP or IMAP email accounts.
+ Once this configuration profile is installed on an iOS device,
+ corresponding users will not be able to modify these settings on their devices.
+
+
+
+
+
+
+
+
+
+
+
+
+ AirPlay Settings
+
+
+
+
+
+
+
+ This configuration can be used to define settings for connecting to AirPlay
+ destinations.
+ Once this configuration profile is installed on an iOS device,
+ corresponding users will not be able to modify these settings on their devices.
+ (This feature is supported only on iOS 7.0 and later.)
+
+
+
+
+
+
+
+
+
+
+
+
+ LDAP Settings
+
+
+
+
+
+
+
+ This configuration can be used to define settings for connecting to LDAP
+ servers.
+ Once this configuration profile is installed on an iOS device,
+ corresponding users will not be able to modify these settings on their devices.
+
+
+
+
+
+
+
+
+
+
+ Account Description
+
+
+
+
+
+
+
+
+
+ Account Hostname
+
+
+
+
+
+
+
+
+
+
+
+ Use Secure Socket Layer ( SSL )
+
+
+
+
+
+
+
+ Account Username
+
+
+
+
+
+
+
+
+
+ Account Password
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Calendar
+
+
+
+
+
+
+
+ This configuration can be used to define settings for connecting to CalDAV
+ servers.
+ Once this configuration profile is installed on an iOS device,
+ corresponding users will not be able to modify these settings on their devices.
+
+
+
+
+
+
+
+
+
+
+
+
+ Calendar Subscription
+
+
+
+
+
+
+
+ This configuration can be used to define settings for calendar subscriptions.
+ Once this configuration profile is installed on an iOS device,
+ corresponding users will not be able to modify these settings on their devices.
+
+
+
+
+
+
+
+
+
+
+
+
+ Access Point Names ( APN )
+
+
+
+
+
+
+
+ These configurations can be used to specify Access Point Names ( APN ).
+ Once this configuration profile is installed on an iOS device, corresponding
+ users will not
+ be able to modify these settings on their devices.
+ (This feature is not supported on iOS 7.0 and later.)
+
+
+
+
+
+
+
+
+
+
+
+
+ Cellular Network Settings
+
+
+
+
+
+
+
+ These configurations can be used to specify Cellular Network Settings on an iOS
+ device.
+ Cellular settings cannot be installed if an APN setting is already installed and
+ upon successful installation, corresponding users will not be able to modify
+ these
+ settings on their devices.
+ (This feature is supported only on iOS 7.0 and later.)
+
+
+
+
+
+
+
+
+
+
+ Cellular Configuration Name
+
+
+
+
+
+
+
+
+
+ Authentication Type
+
+
+
+
+
+ PAP
+ CHAP
+
+
+
+
+
+ Username
+
+
+
+
+
+
+
+
+
+ Password
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Restrictions
+
+
+
+
+
+
+
+ These configurations can be used to restrict apps, device features and
+ media content available on an iOS device. Once this configuration profile is installed
+ on a device, corresponding users will not be able to modify these settings on their
+ devices.
+
+
+
+
+
+
+
+
+Restrictions on Device Functionality :
+
+
+
+Restrictions on Applications :
+
+
+
+
+
+ Other Restrictions :
+
+
+
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/public/templates/hidden-operations-windows.hbs b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/public/templates/hidden-operations-windows.hbs
new file mode 100644
index 0000000000..c05725b89d
--- /dev/null
+++ b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/public/templates/hidden-operations-windows.hbs
@@ -0,0 +1,566 @@
+
+
+
+
+
+
+
+
+
+ Passcode Policy
+
+
+
+
+
+
+
+ This configuration can be used to set a passcode policy to an Windows Device.
+ Once this configuration profile is installed on a device, corresponding users will not be able
+ to modify these settings on their devices.
+
+
+
+
+
+
+
+
+
+
+
+
+ Allow simple value
+
+
+
+
+
+
+
+
+
+ Require alphanumeric value
+
+
+
+
+
+
+
+ Minimum passcode length
+
+
+
+
+
+
+ None
+
+ 01
+ 02
+ 03
+ 04
+ 05
+ 06
+ 07
+ 08
+ 09
+ 10
+ 11
+ 12
+ 13
+ 14
+ 15
+
+
+
+
+
+ Minimum number of complex characters
+
+
+
+
+
+
+ None
+
+ 01
+ 02
+ 03
+ 04
+ 05
+
+
+
+
+
+ Maximum passcode age in days
+
+
+
+
+ ( Should be in between 1-to-730 days or none )
+
+
+
+
+
+
+ Passcode history
+
+
+
+
+ ( Should be in between 1-to-50 passcodes or none )
+
+
+
+
+
+
+ Maximum number of failed attempts
+
+
+
+
+
+
+ None
+
+ 03
+ 04
+ 05
+ 06
+ 07
+ 08
+ 09
+ 10
+
+
+
+
+
+
+
+
+
+
+
+
+ Restrictions on Camera
+
+
+
+
+
+
+
+ This configuration can be used to restrict the usage of camera on an Windows device together with all the applications using the camera.
+ Once this configuration profile is installed on a device, corresponding users will not be able
+ to modify these settings on their devices.
+
+
+
+
+
+
+
+ Un-check following checkbox in case you need to disable camera.
+
+
+
+
+
+
+ Allow use of camera
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Encryption Settings
+
+
+
+
+
+
+
+ This configuration can be used to encrypt data on an Windows device, when the device is locked and
+ make it readable when the passcode is entered. Once this configuration profile is installed on a device,
+ corresponding users will not be able to modify these settings on their devices.
+
+
+
+
+
+
+
+ Un-check following checkbox in case you need to disable storage-encryption.
+
+
+
+
+
+
+ Enable storage-encryption
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Application Restriction Settings
+
+
+
+
+
+
+
+ This configuration can be used to create a black list or white list of applications.
+
+
+
+
+
+
+
+
+
+
+ None
+
+ Black List
+ White List
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/view.hbs b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/view.hbs
new file mode 100644
index 0000000000..b7f2adf56d
--- /dev/null
+++ b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/view.hbs
@@ -0,0 +1,88 @@
+{{#zone "content"}}
+ {{#defineZone "policy-profile-top"}}
+
+ {{/defineZone}}
+
+
+
+{{/zone}}
+{{#zone "bottomJs"}}
+
+
+
+
+
+
+ {{js "js/view.js"}}
+{{/zone}}
+
diff --git a/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/view.js b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/view.js
new file mode 100644
index 0000000000..2d2a438263
--- /dev/null
+++ b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/view.js
@@ -0,0 +1,25 @@
+/*
+ * Copyright (c) 2015, WSO2 Inc. (http://www.wso2.org) All Rights Reserved.
+ *
+ * WSO2 Inc. licenses this file to you under the Apache License,
+ * Version 2.0 (the "License"); you may not use this file except
+ * in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
+ * either express or implied. See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+function onRequest(context) {
+// var log = new Log("policy-view-edit-unit backend js");
+
+// var userModule = require("/app/modules/business-controllers/user.js")["userModule"];
+// context.roles = userModule.getRoles();
+ return context;
+}
\ No newline at end of file
diff --git a/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/view.json b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/view.json
new file mode 100644
index 0000000000..f706ffceea
--- /dev/null
+++ b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/units/cdmf.unit.effective-policy.view/view.json
@@ -0,0 +1,3 @@
+{
+ "version" : "1.0.0"
+}
\ No newline at end of file