open-nomad/ui/app/services/token.js

109 lines
3.1 KiB
JavaScript
Raw Normal View History

import Service, { inject as service } from '@ember/service';
import { computed } from '@ember/object';
import { alias } from '@ember/object/computed';
import { getOwner } from '@ember/application';
import { assign } from '@ember/polyfills';
import { task } from 'ember-concurrency';
import queryString from 'query-string';
2017-11-14 18:50:29 +00:00
import fetch from 'nomad-ui/utils/fetch';
2017-09-19 14:47:10 +00:00
export default Service.extend({
store: service(),
system: service(),
aclEnabled: true,
2017-09-19 14:47:10 +00:00
secret: computed({
get() {
return window.localStorage.nomadTokenSecret;
2017-09-19 14:47:10 +00:00
},
set(key, value) {
if (value == null) {
window.localStorage.removeItem('nomadTokenSecret');
2017-09-19 14:47:10 +00:00
} else {
window.localStorage.nomadTokenSecret = value;
2017-09-19 14:47:10 +00:00
}
return value;
},
}),
fetchSelfToken: task(function*() {
const TokenAdapter = getOwner(this).lookup('adapter:token');
try {
return yield TokenAdapter.findSelf();
} catch (e) {
const errors = e.errors ? e.errors.mapBy('detail') : [];
if (errors.find(error => error === 'ACL support disabled')) {
this.set('aclEnabled', false);
}
return null;
}
}),
selfToken: computed('secret', 'fetchSelfToken.lastSuccessful.value', function() {
if (this.secret) return this.get('fetchSelfToken.lastSuccessful.value');
}),
fetchSelfTokenPolicies: task(function*() {
try {
if (this.selfToken) {
return yield this.selfToken.get('policies');
} else {
let policy = yield this.store.findRecord('policy', 'anonymous');
return [policy];
}
} catch (e) {
return [];
}
}),
selfTokenPolicies: alias('fetchSelfTokenPolicies.lastSuccessful.value'),
fetchSelfTokenAndPolicies: task(function*() {
yield this.fetchSelfToken.perform();
if (this.aclEnabled) {
yield this.fetchSelfTokenPolicies.perform();
}
}),
// All non Ember Data requests should go through authorizedRequest.
// However, the request that gets regions falls into that category.
// This authorizedRawRequest is necessary in order to fetch data
// with the guarantee of a token but without the automatic region
// param since the region cannot be known at this point.
authorizedRawRequest(url, options = { credentials: 'include' }) {
const headers = {};
2019-03-26 07:46:44 +00:00
const token = this.secret;
if (token) {
headers['X-Nomad-Token'] = token;
}
return fetch(url, assign(options, { headers }));
},
authorizedRequest(url, options) {
if (this.get('system.shouldIncludeRegion')) {
const region = this.get('system.activeRegion');
if (region) {
url = addParams(url, { region });
}
}
return this.authorizedRawRequest(url, options);
},
reset() {
this.fetchSelfToken.cancelAll({ resetState: true });
this.fetchSelfTokenPolicies.cancelAll({ resetState: true });
this.fetchSelfTokenAndPolicies.cancelAll({ resetState: true });
},
2017-09-19 14:47:10 +00:00
});
function addParams(url, params) {
const paramsStr = queryString.stringify(params);
const delimiter = url.includes('?') ? '&' : '?';
return `${url}${delimiter}${paramsStr}`;
}