193 lines
6.8 KiB
JavaScript
193 lines
6.8 KiB
JavaScript
////////////////////////////////////////////////////////////////////////////
|
|
//
|
|
// Copyright 2016 Realm Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
//
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
'use strict';
|
|
|
|
const AuthError = require('./errors').AuthError;
|
|
|
|
function node_require(module) {
|
|
return require(module);
|
|
}
|
|
|
|
const performFetch = typeof fetch === 'undefined' ? node_require('node-fetch') : fetch;
|
|
|
|
const url_parse = require('url-parse');
|
|
|
|
const postHeaders = {
|
|
'content-type': 'application/json;charset=utf-8',
|
|
'accept': 'application/json'
|
|
};
|
|
|
|
function auth_url(server) {
|
|
if (server.charAt(server.length-1) != '/') {
|
|
return server + '/auth';
|
|
}
|
|
return server + 'auth';
|
|
}
|
|
|
|
function scheduleAccessTokenRefresh(user, localRealmPath, realmUrl, expirationDate) {
|
|
const refreshBuffer = 10 * 1000;
|
|
const timeout = expirationDate - Date.now() - refreshBuffer;
|
|
setTimeout(() => refreshAccessToken(user, localRealmPath, realmUrl), timeout);
|
|
}
|
|
|
|
function refreshAccessToken(user, localRealmPath, realmUrl) {
|
|
let parsedRealmUrl = url_parse(realmUrl);
|
|
const url = auth_url(user.server);
|
|
const options = {
|
|
method: 'POST',
|
|
body: JSON.stringify({
|
|
data: user.token,
|
|
path: parsedRealmUrl.pathname,
|
|
provider: 'realm',
|
|
app_id: ''
|
|
}),
|
|
headers: postHeaders
|
|
};
|
|
performFetch(url, options)
|
|
// in case something lower in the HTTP stack breaks, try again in 10 seconds
|
|
.catch(() => setTimeout(() => refreshAccessToken(user, localRealmPath, realmUrl), 10 * 1000))
|
|
.then((response) => response.json().then((json) => { return { response, json }; }))
|
|
.then((responseAndJson) => {
|
|
const response = responseAndJson.response;
|
|
const json = responseAndJson.json;
|
|
if (response.status != 200) {
|
|
//FIXME: propagate error to session error handler
|
|
/*
|
|
let session = user._sessionForOnDiskPath(localRealmPath);
|
|
let errorHandler = session._errorHandler;
|
|
if (errorHandler) {
|
|
errorHandler(session, new AuthError(json));
|
|
}
|
|
*/
|
|
} else {
|
|
// Look up a fresh instance of the user.
|
|
// We do this because in React Native Remote Debugging
|
|
// `Realm.clearTestState()` will have invalidated the user object
|
|
let newUser = user.constructor.all[user.identity];
|
|
if (newUser) {
|
|
let session = newUser._sessionForOnDiskPath(localRealmPath);
|
|
if (session && session.state !== 'invalid') {
|
|
parsedRealmUrl.set('pathname', json.access_token.token_data.path);
|
|
session._refreshAccessToken(json.access_token.token, parsedRealmUrl.href);
|
|
|
|
const tokenExpirationDate = new Date(json.access_token.token_data.expires * 1000);
|
|
scheduleAccessTokenRefresh(newUser, localRealmPath, realmUrl, tokenExpirationDate);
|
|
}
|
|
}
|
|
}
|
|
});
|
|
}
|
|
|
|
function _authenticate(userConstructor, server, json, callback) {
|
|
json.app_id = '';
|
|
const url = auth_url(server);
|
|
const options = {
|
|
method: 'POST',
|
|
body: JSON.stringify(json),
|
|
headers: postHeaders,
|
|
open_timeout: 5000
|
|
};
|
|
performFetch(url, options)
|
|
.then((response) => {
|
|
if (response.status !== 200) {
|
|
return response.json().then((body) => callback(new AuthError(body)));
|
|
} else {
|
|
return response.json().then(function (body) {
|
|
// TODO: validate JSON
|
|
const token = body.refresh_token.token;
|
|
const identity = body.refresh_token.token_data.identity;
|
|
callback(undefined, userConstructor.createUser(server, identity, token, false));
|
|
})
|
|
}
|
|
})
|
|
.catch(callback);
|
|
}
|
|
|
|
module.exports = {
|
|
static: {
|
|
get current() {
|
|
const allUsers = this.all;
|
|
const keys = Object.keys(allUsers);
|
|
if (keys.length === 0) {
|
|
return undefined;
|
|
} else if (keys.length > 1) {
|
|
throw new Error("Multiple users are logged in");
|
|
}
|
|
|
|
return allUsers[keys[0]];
|
|
},
|
|
|
|
adminUser(token) {
|
|
var uuid = 'xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx'.replace(/[xy]/g, function(c) {
|
|
var r = Math.random()*16|0, v = c == 'x' ? r : (r&0x3|0x8);
|
|
return v.toString(16);
|
|
});
|
|
var user = this.createUser('', uuid, token, true);
|
|
return user;
|
|
},
|
|
|
|
register(server, username, password, callback) {
|
|
_authenticate(this, server, {
|
|
provider: 'password',
|
|
user_info: { password: password, register: true },
|
|
data: username
|
|
}, callback);
|
|
},
|
|
|
|
login(server, username, password, callback) {
|
|
_authenticate(this, server, {
|
|
provider: 'password',
|
|
user_info: { password: password },
|
|
data: username
|
|
}, callback);
|
|
},
|
|
|
|
registerWithProvider(server, provider, providerToken, callback) {
|
|
_authenticate(this, server, {
|
|
provider: provider,
|
|
data: providerToken
|
|
}, callback);
|
|
},
|
|
|
|
_refreshAccessToken: refreshAccessToken
|
|
},
|
|
instance: {
|
|
openManagementRealm() {
|
|
let url = url_parse(this.server);
|
|
if (url.protocol === 'http:') {
|
|
url.set('protocol', 'realm:');
|
|
} else if (url.protocol === 'https:') {
|
|
url.set('protocol', 'realms:');
|
|
} else {
|
|
throw new Error(`Unexpected user auth url: ${this.server}`);
|
|
}
|
|
|
|
url.set('pathname', '/~/__management');
|
|
|
|
const realmConstructor = require('./index');
|
|
return new realmConstructor({
|
|
schema: require('./management-schema'),
|
|
sync: {
|
|
user: this,
|
|
url: url.href
|
|
}
|
|
});
|
|
}
|
|
}
|
|
}; |