From 55a95cca8663746179367d4d36735af90dc20b59 Mon Sep 17 00:00:00 2001 From: GPrathap Date: Wed, 20 Apr 2016 22:08:30 +0530 Subject: [PATCH] bug fixes --- .../devicemgt/app/modules/login.js | 14 ++-- .../jaggeryapps/devicemgt/app/modules/util.js | 3 +- .../uuf-template-app/lib/modules/auth/auth.js | 70 +++++++++---------- 3 files changed, 47 insertions(+), 40 deletions(-) diff --git a/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/modules/login.js b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/modules/login.js index 00e57c7d4f..1c014f4ab8 100644 --- a/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/modules/login.js +++ b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/modules/login.js @@ -20,13 +20,19 @@ var onSuccess; var onFail; (function () { - var log = new Log("api/user-api.jag"); - + var log = new Log("/app/modules/login.js"); + var constants = require("/app/modules/constants.js"); onSuccess = function (context) { + var properties; var utility = require("/app/modules/utility.js").utility; var apiWrapperUtil = require("/app/modules/api-wrapper-util.js").apiWrapperUtil; - var properties = {username: context.input.username, password: context.input.password}; - apiWrapperUtil.setupAccessTokenPair("password", properties); + if(context.input.samlToken){ + properties = {samlToken: context.input.samlToken}; + apiWrapperUtil.setupAccessTokenPair(constants.GRANT_TYPE_SAML, properties); + }else{ + properties = {username: context.input.username, password: context.input.password}; + apiWrapperUtil.setupAccessTokenPair(constants.GRANT_TYPE_PASSWORD, properties); + } }; onFail = function (error) { diff --git a/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/modules/util.js b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/modules/util.js index 718c79acaf..6b58c5ae1e 100644 --- a/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/modules/util.js +++ b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/devicemgt/app/modules/util.js @@ -17,6 +17,7 @@ */ var util = function () { + var log = new Log("/app/modules/util.js"); var module = {}; var Base64 = Packages.org.apache.commons.codec.binary.Base64; var String = Packages.java.lang.String; @@ -123,7 +124,7 @@ var util = function () { xhr.setRequestHeader("Content-Type", "application/x-www-form-urlencoded"); xhr.setRequestHeader("Authorization", "Basic " + clientKeys); xhr.send("grant_type=urn:ietf:params:oauth:grant-type:saml2-bearer&assertion=" + - encodeURIComponent(encodedExtractedAssertion) + "&scope=" + "PRODUCTION"); + encodeURIComponent(encodedExtractedAssertion) + "&scope=" + "PRODUCTION"); var tokenPair = {}; if (xhr.status == 200) { var data = parse(xhr.responseText); diff --git a/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/uuf-template-app/lib/modules/auth/auth.js b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/uuf-template-app/lib/modules/auth/auth.js index 73563a8c57..922563ed6b 100644 --- a/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/uuf-template-app/lib/modules/auth/auth.js +++ b/components/device-mgt/org.wso2.carbon.device.mgt.ui/src/main/resources/jaggeryapps/uuf-template-app/lib/modules/auth/auth.js @@ -56,7 +56,7 @@ var module = {}; cachedAuthModuleConfigs = authModuleConfigs; } else { log.error("Cannot find User module configurations in application configuration file '" - + constants.FILE_APP_CONF + "'."); + + constants.FILE_APP_CONF + "'."); cachedAuthModuleConfigs = {}; } return cachedAuthModuleConfigs; @@ -85,7 +85,7 @@ var module = {}; return (rv) ? rv : {}; } else { log.error("Cannot find login configurations in Auth module configurations in " - + "application configuration file '" + constants.FILE_APP_CONF + "'."); + + "application configuration file '" + constants.FILE_APP_CONF + "'."); return {}; } } @@ -113,7 +113,7 @@ var module = {}; return (rv) ? rv : {}; } else { log.error("Cannot find logout configurations in Auth module configurations in " - + "application configuration file '" + constants.FILE_APP_CONF + "'."); + + "application configuration file '" + constants.FILE_APP_CONF + "'."); return {}; } } @@ -133,7 +133,7 @@ var module = {}; cachedSsoConfigs = ssoConfigs; } else { log.error("Cannot find SSO configurations in Auth module configurations in application " - + "configuration file '" + constants.FILE_APP_CONF + "'."); + + "configuration file '" + constants.FILE_APP_CONF + "'."); cachedSsoConfigs = {}; } return cachedSsoConfigs; @@ -156,13 +156,13 @@ var module = {}; if (operation == OPERATION_LOGIN) { configs = getLoginConfigurations(event); pageFullName = (event == EVENT_SUCCESS) ? - configs[constants.APP_CONF_AUTH_MODULE_LOGIN_ON_SUCCESS_PAGE] : - configs[constants.APP_CONF_AUTH_MODULE_LOGIN_ON_FAIL_PAGE]; + configs[constants.APP_CONF_AUTH_MODULE_LOGIN_ON_SUCCESS_PAGE] : + configs[constants.APP_CONF_AUTH_MODULE_LOGIN_ON_FAIL_PAGE]; } else { configs = getLogoutConfigurations(event); pageFullName = (event == EVENT_SUCCESS) ? - configs[constants.APP_CONF_AUTH_MODULE_LOGOUT_ON_SUCCESS_PAGE] : - configs[constants.APP_CONF_AUTH_MODULE_LOGOUT_ON_FAIL_PAGE]; + configs[constants.APP_CONF_AUTH_MODULE_LOGOUT_ON_SUCCESS_PAGE] : + configs[constants.APP_CONF_AUTH_MODULE_LOGOUT_ON_FAIL_PAGE]; } if (pageFullName) { @@ -173,13 +173,13 @@ var module = {}; return page.definition[constants.PAGE_DEFINITION_URI]; } log.warn("Page '" + pageFullName + "' mentioned in Auth module configurations in " - + "application configuration file '" + constants.FILE_APP_CONF - + "' is disabled."); + + "application configuration file '" + constants.FILE_APP_CONF + + "' is disabled."); } else { log.error("Page '" + pageFullName + "' mentioned in Auth module configurations in " - + "application configuration file '" + constants.FILE_APP_CONF - + "' does not exists."); + + "application configuration file '" + constants.FILE_APP_CONF + + "' does not exists."); } } return "/"; @@ -207,13 +207,13 @@ var module = {}; if (operation == OPERATION_LOGIN) { configs = getLoginConfigurations(event); scriptFilePath = (event == EVENT_SUCCESS) ? - configs[constants.APP_CONF_AUTH_MODULE_LOGIN_ON_SUCCESS_SCRIPT] : - configs[constants.APP_CONF_AUTH_MODULE_LOGIN_ON_FAIL_SCRIPT]; + configs[constants.APP_CONF_AUTH_MODULE_LOGIN_ON_SUCCESS_SCRIPT] : + configs[constants.APP_CONF_AUTH_MODULE_LOGIN_ON_FAIL_SCRIPT]; } else { configs = getLogoutConfigurations(event); scriptFilePath = (event == EVENT_SUCCESS) ? - configs[constants.APP_CONF_AUTH_MODULE_LOGOUT_ON_SUCCESS_SCRIPT] : - configs[constants.APP_CONF_AUTH_MODULE_LOGOUT_ON_FAIL_SCRIPT]; + configs[constants.APP_CONF_AUTH_MODULE_LOGOUT_ON_SUCCESS_SCRIPT] : + configs[constants.APP_CONF_AUTH_MODULE_LOGOUT_ON_FAIL_SCRIPT]; } if (!scriptFilePath || (scriptFilePath.length == 0)) { @@ -222,8 +222,8 @@ var module = {}; var scriptFile = new File(scriptFilePath); if (!scriptFile.isExists() || scriptFile.isDirectory()) { log.error("Script '" + scriptFilePath + "' mentioned in Auth module configurations in " - + "application configuration file '" + constants.FILE_APP_CONF - + "' does not exists."); + + "application configuration file '" + constants.FILE_APP_CONF + + "' does not exists."); return true; } @@ -265,7 +265,7 @@ var module = {}; } else { // event == EVENT_FAIL redirectUri = getRedirectUri(operation, EVENT_FAIL) + "?error=" + scriptArgument.message - + "&" + constants.URL_PARAM_REFERER + "=" + getRelayState(operation); + + "&" + constants.URL_PARAM_REFERER + "=" + getRelayState(operation); } response.sendRedirect(encodeURI(module.getAppContext() + redirectUri)); } @@ -276,8 +276,8 @@ var module = {}; var identityProviderUrl = ssoConfigs[constants.APP_CONF_AUTH_MODULE_SSO_IDENTITY_PROVIDER_URL]; if (!identityProviderUrl || (identityProviderUrl.length == 0)) { var msg = "Identity Provider URL is not given in SSO configurations in Auth module " - + "configurations in application configuration file '" - + constants.FILE_APP_CONF + "'."; + + "configurations in application configuration file '" + + constants.FILE_APP_CONF + "'."; log.error(msg); response.sendError(500, msg); return null; @@ -286,7 +286,7 @@ var module = {}; var issuer = ssoConfigs[constants.APP_CONF_AUTH_MODULE_SSO_ISSUER]; if (!issuer || (issuer.length == 0)) { var msg = "Issuer is not given in SSO configurations in Auth module configurations in " - + "application configuration file '" + constants.FILE_APP_CONF + "'."; + + "application configuration file '" + constants.FILE_APP_CONF + "'."; log.error(msg); response.sendError(500, msg); return null; @@ -316,8 +316,8 @@ var module = {}; var identityProviderUrl = ssoConfigs[constants.APP_CONF_AUTH_MODULE_SSO_IDENTITY_PROVIDER_URL]; if (!identityProviderUrl || (identityProviderUrl.length == 0)) { var msg = "Identity Provider URL is not given in SSO configurations in Auth module " - + "configurations in application configuration file '" - + constants.FILE_APP_CONF + "'."; + + "configurations in application configuration file '" + + constants.FILE_APP_CONF + "'."; log.error(msg); response.sendError(500, msg); return null; @@ -331,7 +331,7 @@ var module = {}; var issuer = ssoConfigs[constants.APP_CONF_AUTH_MODULE_SSO_ISSUER]; if (!issuer || (issuer.length == 0)) { var msg = "Issuer is not given in SSO configurations in Auth module configurations in " - + "application configuration file '" + constants.FILE_APP_CONF + "'."; + + "application configuration file '" + constants.FILE_APP_CONF + "'."; log.error(msg); response.sendError(500, msg); return null; @@ -341,10 +341,10 @@ var module = {}; try { var ssoClient = require("sso").client; encodedSAMLAuthRequest = ssoClient.getEncodedSAMLLogoutRequest(username, - ssoSessionIndex, issuer); + ssoSessionIndex, issuer); } catch (e) { log.error("Cannot create SAML logout authorization token for user '" + username - + "' with issuer '" + issuer + "'."); + + "' with issuer '" + issuer + "'."); log.error(e.message, e); response.sendError(500, e.message); return null; @@ -446,17 +446,17 @@ var module = {}; intermediatePage = utils.getFurthestChild(intermediatePage); if (!intermediatePage.disabled) { renderer.renderUiComponent(intermediatePage, requestParams, renderingContext, - lookupTable, response); + lookupTable, response); return; } log.warn("Intermediate page '" + intermediatePageName + " mentioned in Auth module " - + "configurations in application configuration file '" - + constants.FILE_APP_CONF + "' is disabled."); + + "configurations in application configuration file '" + + constants.FILE_APP_CONF + "' is disabled."); } else { log.error("Intermediate page '" + intermediatePageName - + " mentioned in Auth module " - + "configurations in application configuration file '" - + constants.FILE_APP_CONF + "' does not exists."); + + " mentioned in Auth module " + + "configurations in application configuration file '" + + constants.FILE_APP_CONF + "' does not exists."); } } @@ -528,13 +528,13 @@ var module = {}; * string}} */ var ssoSession = ssoClient.decodeSAMLLoginResponse(samlResponseObj, samlResponse, - session.getId()); + session.getId()); if (ssoSession.sessionId) { var ssoSessions = getSsoSessions(); ssoSessions[ssoSession.sessionId] = ssoSession; var carbonUser = (require("carbon")).server.tenantUser(ssoSession.loggedInUser); utils.setCurrentUser(carbonUser.username, carbonUser.domain, carbonUser.tenantId); - var scriptArgument = {input: {}, user: module.getCurrentUser()}; + var scriptArgument = {input: {samlToken: ssoSession.samlToken}, user: module.getCurrentUser()}; handleEvent(OPERATION_LOGIN, EVENT_SUCCESS, scriptArgument); } else { var msg = "Cannot decode SAML login response.";