mirror of
https://github.com/Alfresco/alfresco-ng2-components.git
synced 2025-07-24 17:32:15 +00:00
[AAE-8639] Discovery OpenId - Load discovery and pass info to jsapi (#7632)
* Load discovery and pass info to jsapi * fix the roles empty scenario tests * Make lint happier * Rename the initApi method * Add secret field Co-authored-by: arditdomi <ardit.domi@hyland.com>
This commit is contained in:
@@ -21,6 +21,7 @@ import { ObjectUtils } from '../utils/object-utils';
|
||||
import { Observable, Subject } from 'rxjs';
|
||||
import { map, distinctUntilChanged, take } from 'rxjs/operators';
|
||||
import { ExtensionConfig, ExtensionService, mergeObjects } from '@alfresco/adf-extensions';
|
||||
import { OpenidConfiguration } from '../services/openid-configuration.interface';
|
||||
|
||||
/* spellchecker: disable */
|
||||
// eslint-disable-next-line no-shadow
|
||||
@@ -208,6 +209,26 @@ export class AppConfigService {
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Call the discovery API to fetch configuration
|
||||
*
|
||||
* @returns Discovery configuration
|
||||
*/
|
||||
loadWellKnown(hostIdp: string): Promise<OpenidConfiguration> {
|
||||
return new Promise(async (resolve, reject) => {
|
||||
this.http
|
||||
.get<OpenidConfiguration>(`${hostIdp}/.well-known/openid-configuration`)
|
||||
.subscribe({
|
||||
next: (res: OpenidConfiguration) => {
|
||||
resolve(res);
|
||||
},
|
||||
error: (err: any) => {
|
||||
reject(err);
|
||||
}
|
||||
});
|
||||
});
|
||||
}
|
||||
|
||||
private formatString(str: string, keywords: Map<string, string>): string {
|
||||
let result = str;
|
||||
|
||||
|
@@ -186,7 +186,8 @@
|
||||
"SILENT": "Silent Login",
|
||||
"SCOPE": "Scope",
|
||||
"CLIENT": "Client ID",
|
||||
"PUBLIC_URLS": "Public urls silent Login"
|
||||
"PUBLIC_URLS": "Public urls silent Login",
|
||||
"SECRET": "Secret"
|
||||
},
|
||||
"CARDVIEW": {
|
||||
"KEYVALUEPAIRS": {
|
||||
|
20
lib/core/services/alfresco-api.interface.ts
Normal file
20
lib/core/services/alfresco-api.interface.ts
Normal file
@@ -0,0 +1,20 @@
|
||||
/*!
|
||||
* @license
|
||||
* Copyright 2019 Alfresco Software, Ltd.
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
export interface AlfrescoApiInterface {
|
||||
load(): Promise<void> ;
|
||||
}
|
@@ -21,6 +21,7 @@ import { AppConfigService, AppConfigValues } from '../app-config/app-config.serv
|
||||
import { Subject, ReplaySubject } from 'rxjs';
|
||||
import { OauthConfigModel } from '../models/oauth-config.model';
|
||||
import { StorageService } from './storage.service';
|
||||
import { OpenidConfiguration } from './openid-configuration.interface';
|
||||
|
||||
@Injectable({
|
||||
providedIn: 'root'
|
||||
@@ -36,6 +37,9 @@ export class AlfrescoApiService {
|
||||
protected alfrescoApi: AlfrescoApi;
|
||||
|
||||
lastConfig: AlfrescoApiConfig;
|
||||
currentAppConfig: AlfrescoApiConfig;
|
||||
|
||||
idpConfig: OpenidConfiguration;
|
||||
|
||||
private excludedErrorUrl: string[] = ['api/enterprise/system/properties'];
|
||||
|
||||
@@ -49,25 +53,52 @@ export class AlfrescoApiService {
|
||||
}
|
||||
|
||||
async load() {
|
||||
await this.appConfig.load().then(() => {
|
||||
try {
|
||||
await this.appConfig.load();
|
||||
this.storageService.prefix = this.appConfig.get<string>(AppConfigValues.STORAGE_PREFIX, '');
|
||||
this.initAlfrescoApi();
|
||||
this.alfrescoApiInitialized.next(true);
|
||||
});
|
||||
this.getCurrentAppConfig();
|
||||
|
||||
if (this.currentAppConfig.authType === 'OAUTH') {
|
||||
this.idpConfig = await this.appConfig.loadWellKnown(this.currentAppConfig.oauth2.host);
|
||||
this.mapAlfrescoApiOpenIdConfig();
|
||||
}
|
||||
} catch {
|
||||
throw new Error('Something wrong happened when calling the app.config.json');
|
||||
}
|
||||
|
||||
this.initAlfrescoApiWithConfig();
|
||||
this.alfrescoApiInitialized.next(true);
|
||||
}
|
||||
|
||||
reset() {
|
||||
this.initAlfrescoApi();
|
||||
async reset() {
|
||||
this.getCurrentAppConfig();
|
||||
if (this.currentAppConfig.authType === 'OAUTH') {
|
||||
this.idpConfig = await this.appConfig.loadWellKnown(this.currentAppConfig.oauth2.host);
|
||||
this.mapAlfrescoApiOpenIdConfig();
|
||||
}
|
||||
this.initAlfrescoApiWithConfig();
|
||||
}
|
||||
|
||||
protected initAlfrescoApi() {
|
||||
private getAuthWithFixedOriginLocation(): OauthConfigModel {
|
||||
const oauth: OauthConfigModel = Object.assign({}, this.appConfig.get<OauthConfigModel>(AppConfigValues.OAUTHCONFIG, null));
|
||||
if (oauth) {
|
||||
oauth.redirectUri = window.location.origin + window.location.pathname;
|
||||
oauth.redirectUriLogout = window.location.origin + window.location.pathname;
|
||||
}
|
||||
return oauth;
|
||||
}
|
||||
|
||||
const config = new AlfrescoApiConfig({
|
||||
private mapAlfrescoApiOpenIdConfig() {
|
||||
this.currentAppConfig.oauth2.tokenUrl = this.idpConfig.token_endpoint;
|
||||
this.currentAppConfig.oauth2.authorizationUrl = this.idpConfig.authorization_endpoint;
|
||||
this.currentAppConfig.oauth2.logoutUrl = this.idpConfig.end_session_endpoint;
|
||||
this.currentAppConfig.oauth2.userinfoEndpoint = this.idpConfig.userinfo_endpoint;
|
||||
}
|
||||
|
||||
private getCurrentAppConfig() {
|
||||
const oauth = this.getAuthWithFixedOriginLocation();
|
||||
|
||||
this.currentAppConfig = new AlfrescoApiConfig({
|
||||
provider: this.appConfig.get<string>(AppConfigValues.PROVIDERS),
|
||||
hostEcm: this.appConfig.get<string>(AppConfigValues.ECMHOST),
|
||||
hostBpm: this.appConfig.get<string>(AppConfigValues.BPMHOST),
|
||||
@@ -79,15 +110,20 @@ export class AlfrescoApiService {
|
||||
domainPrefix : this.appConfig.get<string>(AppConfigValues.STORAGE_PREFIX),
|
||||
oauth2: oauth
|
||||
});
|
||||
}
|
||||
|
||||
if (this.alfrescoApi && this.isDifferentConfig(this.lastConfig, config)) {
|
||||
this.lastConfig = config;
|
||||
this.alfrescoApi.setConfig(config);
|
||||
protected initAlfrescoApi() {
|
||||
this.getCurrentAppConfig();
|
||||
this.initAlfrescoApiWithConfig();
|
||||
}
|
||||
|
||||
private initAlfrescoApiWithConfig() {
|
||||
if (this.alfrescoApi && this.isDifferentConfig(this.lastConfig, this.currentAppConfig)) {
|
||||
this.alfrescoApi.setConfig(this.currentAppConfig);
|
||||
} else {
|
||||
this.lastConfig = config;
|
||||
this.alfrescoApi = new AlfrescoApi(config);
|
||||
this.alfrescoApi = new AlfrescoApi(this.currentAppConfig);
|
||||
}
|
||||
|
||||
this.lastConfig = this.currentAppConfig;
|
||||
}
|
||||
|
||||
isDifferentConfig(lastConfig: AlfrescoApiConfig, newConfig: AlfrescoApiConfig) {
|
||||
|
@@ -59,6 +59,13 @@ describe('Auth Guard SSO role service', () => {
|
||||
expect(await authGuard.canActivate(router)).toBeTruthy();
|
||||
});
|
||||
|
||||
it('Should canActivate be true if case of empty roles to check', async () => {
|
||||
const router: ActivatedRouteSnapshot = new ActivatedRouteSnapshot();
|
||||
router.data = { roles: [] };
|
||||
|
||||
expect(await authGuard.canActivate(router)).toBeTruthy();
|
||||
});
|
||||
|
||||
it('Should canActivate be false if the Role is not present int the JWT token', async () => {
|
||||
spyOn(jwtHelperService, 'getAccessToken').and.returnValue('my-access_token');
|
||||
spyOn(jwtHelperService, 'decodeToken').and.returnValue({ realm_access: { roles: ['role3'] } });
|
||||
|
@@ -38,9 +38,13 @@ export class AuthGuardSsoRoleService implements CanActivate {
|
||||
if (route.data) {
|
||||
if (route.data['roles']) {
|
||||
const rolesToCheck: string[] = route.data['roles'];
|
||||
const excludedRoles = route.data['excludedRoles'] || [];
|
||||
const isContentAdmin = rolesToCheck.includes(ContentGroups.ALFRESCO_ADMINISTRATORS) || excludedRoles.includes(ContentGroups.ALFRESCO_ADMINISTRATORS) ? await this.peopleContentService.isContentAdmin() : false;
|
||||
hasRealmRole = excludedRoles.length ? this.checkAccessWithExcludedRoles(rolesToCheck, excludedRoles, isContentAdmin) : this.hasRoles(rolesToCheck, isContentAdmin);
|
||||
if (rolesToCheck.length === 0) {
|
||||
hasRealmRole = true;
|
||||
} else {
|
||||
const excludedRoles = route.data['excludedRoles'] || [];
|
||||
const isContentAdmin = rolesToCheck.includes(ContentGroups.ALFRESCO_ADMINISTRATORS) || excludedRoles.includes(ContentGroups.ALFRESCO_ADMINISTRATORS) ? await this.peopleContentService.isContentAdmin() : false;
|
||||
hasRealmRole = excludedRoles.length ? this.checkAccessWithExcludedRoles(rolesToCheck, excludedRoles, isContentAdmin) : this.hasRoles(rolesToCheck, isContentAdmin);
|
||||
}
|
||||
}
|
||||
|
||||
if (route.data['clientRoles']) {
|
||||
|
26
lib/core/services/openid-configuration.interface.ts
Normal file
26
lib/core/services/openid-configuration.interface.ts
Normal file
@@ -0,0 +1,26 @@
|
||||
/*!
|
||||
* @license
|
||||
* Copyright 2019 Alfresco Software, Ltd.
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
|
||||
export interface OpenidConfiguration {
|
||||
authorization_endpoint: string;
|
||||
token_endpoint: string;
|
||||
userinfo_endpoint: string;
|
||||
end_session_endpoint: string;
|
||||
check_session_iframe: string;
|
||||
revocation_endpoint: string;
|
||||
introspection_endpoint: string;
|
||||
}
|
@@ -103,6 +103,15 @@
|
||||
</mat-error>
|
||||
</mat-form-field>
|
||||
|
||||
<mat-form-field class="adf-full-width">
|
||||
<mat-label>{{ 'CORE.HOST_SETTINGS.SECRET'| translate }}</mat-label>
|
||||
<input matInput name="{{ 'CORE.HOST_SETTINGS.SECRET'| translate }}"
|
||||
formControlName="secret" placeholder="{{ 'CORE.HOST_SETTINGS.SECRET'| translate }}">
|
||||
<mat-error *ngIf="secret.hasError('required')">
|
||||
{{ 'CORE.HOST_SETTINGS.REQUIRED'| translate }}
|
||||
</mat-error>
|
||||
</mat-form-field>
|
||||
|
||||
<label for="silentLogin">{{ 'CORE.HOST_SETTINGS.SILENT'| translate }}</label>
|
||||
<mat-slide-toggle class="adf-full-width" name="silentLogin" [color]="'primary'"
|
||||
formControlName="silentLogin">
|
||||
|
@@ -259,8 +259,8 @@ export class HostSettingsComponent implements OnInit {
|
||||
return this.oauthConfig.get('scope') as FormControl;
|
||||
}
|
||||
|
||||
get secretId(): FormControl {
|
||||
return this.oauthConfig.get('secretId') as FormControl;
|
||||
get secret(): FormControl {
|
||||
return this.oauthConfig.get('secret') as FormControl;
|
||||
}
|
||||
|
||||
get implicitFlow(): FormControl {
|
||||
|
Reference in New Issue
Block a user