angular-aap-auth
Advanced tools
Comparing version 1.0.0-alpha.10 to 1.0.0-alpha.11
@@ -1,315 +0,698 @@ | ||
/** | ||
* Copyright 2017 EMBL - European Bioinformatics Institute | ||
* | ||
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use | ||
* this file except in compliance with the License. You may obtain a copy of the | ||
* License at | ||
* | ||
* http://www.apache.org/licenses/LICENSE-2.0 | ||
* | ||
* Unless required by applicable law or agreed to in writing, software distributed | ||
* under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR | ||
* CONDITIONS OF ANY KIND, either express or implied. See the License for the | ||
* specific language governing permissions and limitations under the License. | ||
*/ | ||
(function (global, factory) { | ||
typeof exports === 'object' && typeof module !== 'undefined' ? factory(exports, require('@angular/core'), require('@auth0/angular-jwt'), require('rxjs'), require('rxjs/operators')) : | ||
typeof define === 'function' && define.amd ? define('angular-aap-auth', ['exports', '@angular/core', '@auth0/angular-jwt', 'rxjs', 'rxjs/operators'], factory) : | ||
(factory((global['angular-aap-auth'] = {}),global.ng.core,global.angularJwt,global.RxJS,global.Rx.Observable.prototype)); | ||
typeof exports === 'object' && typeof module !== 'undefined' ? factory(exports, require('@angular/core'), require('@auth0/angular-jwt'), require('rxjs'), require('rxjs/operators')) : | ||
typeof define === 'function' && define.amd ? define('angular-aap-auth', ['exports', '@angular/core', '@auth0/angular-jwt', 'rxjs', 'rxjs/operators'], factory) : | ||
(factory((global['angular-aap-auth'] = {}),global.ng.core,global.angularJwt,global.RxJS,global.rxjs.operators)); | ||
}(this, (function (exports,core,angularJwt,rxjs,operators) { 'use strict'; | ||
var TokenService = /** @class */ (function () { | ||
function TokenService(_jwt) { | ||
this._jwt = _jwt; | ||
} | ||
TokenService.prototype.getToken = function () { | ||
return this._jwt.tokenGetter(); | ||
}; | ||
TokenService.prototype.getTokenExpirationDate = function () { | ||
try { | ||
return this._jwt.getTokenExpirationDate(); | ||
/** | ||
* @fileoverview added by tsickle | ||
* @suppress {checkTypes} checked by tsc | ||
*/ | ||
/** | ||
* The purpose of this very simple service is to interface between the | ||
* AuthService and the specific token manipulation routing of JwtHelperService. | ||
* In this way, if in the future we want to replace JwtHelperService by | ||
* another service, AuthService doesn't need to be modified, only this service. | ||
*/ | ||
var TokenService = (function () { | ||
function TokenService(_jwt) { | ||
this._jwt = _jwt; | ||
} | ||
catch (e) { | ||
return null; | ||
} | ||
}; | ||
TokenService.prototype.isTokenValid = function () { | ||
try { | ||
return !this._jwt.isTokenExpired(); | ||
} | ||
catch (error) { | ||
return false; | ||
} | ||
}; | ||
TokenService.prototype.getClaim = function (claim, defaultValue) { | ||
try { | ||
var value = (this._jwt.decodeToken()[claim]); | ||
if (value === undefined) { | ||
return defaultValue; | ||
} | ||
return value; | ||
} | ||
catch (e) { | ||
return defaultValue; | ||
} | ||
}; | ||
return TokenService; | ||
}()); | ||
TokenService.decorators = [ | ||
{ type: core.Injectable }, | ||
]; | ||
TokenService.ctorParameters = function () { return [ | ||
{ type: angularJwt.JwtHelperService, }, | ||
]; }; | ||
var AAP_CONFIG = new core.InjectionToken('AAP_CONFIG'); | ||
function getToken() { | ||
return localStorage.getItem('id_token') || ''; | ||
} | ||
function removeToken() { | ||
return localStorage.removeItem('id_token'); | ||
} | ||
function updateToken(newToken) { | ||
return localStorage.setItem('id_token', newToken); | ||
} | ||
var DEFAULT_CONF = { | ||
aapURL: 'https://api.aai.ebi.ac.uk', | ||
tokenGetter: getToken, | ||
tokenRemover: removeToken, | ||
tokenUpdater: updateToken | ||
}; | ||
var AuthService = /** @class */ (function () { | ||
function AuthService(_rendererFactory, _tokenService, config) { | ||
var _this = this; | ||
this._rendererFactory = _rendererFactory; | ||
this._tokenService = _tokenService; | ||
this.config = config; | ||
this._credentials = new rxjs.BehaviorSubject(null); | ||
this._loginCallbacks = []; | ||
this._logoutCallbacks = []; | ||
this._timeoutID = null; | ||
this._commKeyName = 'AngularAapAuthUpdated'; | ||
this._commKeyUpdater = function () { return localStorage.setItem(_this._commKeyName, '' + new Date().getTime()); }; | ||
this._domain = encodeURIComponent(window.location.origin); | ||
this._appURL = config.aapURL.replace(/\/$/, ''); | ||
this._storageUpdater = config.tokenUpdater; | ||
if (config.tokenRemover) { | ||
this._storageRemover = config.tokenRemover; | ||
} | ||
else { | ||
this._storageRemover = function () { return config.tokenUpdater(null); }; | ||
} | ||
var renderer = this._rendererFactory.createRenderer(null, null); | ||
this._listenLoginMessage(renderer); | ||
this._listenChangesFromOtherWindows(renderer); | ||
this._updateCredentials(); | ||
/** | ||
* @return {?} | ||
*/ | ||
TokenService.prototype.getToken = /** | ||
* @return {?} | ||
*/ | ||
function () { | ||
return this._jwt.tokenGetter(); | ||
}; | ||
/** | ||
* @return {?} | ||
*/ | ||
TokenService.prototype.getTokenExpirationDate = /** | ||
* @return {?} | ||
*/ | ||
function () { | ||
try { | ||
return this._jwt.getTokenExpirationDate(); | ||
} | ||
catch (e) { | ||
return null; | ||
} | ||
}; | ||
/** | ||
* @return {?} | ||
*/ | ||
TokenService.prototype.isTokenValid = /** | ||
* @return {?} | ||
*/ | ||
function () { | ||
try { | ||
return !this._jwt.isTokenExpired(); | ||
} | ||
catch (error) { | ||
return false; | ||
} | ||
}; | ||
/** | ||
* Get claims from the token. | ||
* | ||
* @template T, C | ||
* @param {?} claim The name of the claim | ||
* @param {?} defaultValue The default value returned in case of error | ||
* | ||
* @return {?} claim or default value | ||
*/ | ||
TokenService.prototype.getClaim = /** | ||
* Get claims from the token. | ||
* | ||
* @template T, C | ||
* @param {?} claim The name of the claim | ||
* @param {?} defaultValue The default value returned in case of error | ||
* | ||
* @return {?} claim or default value | ||
*/ | ||
function (claim, defaultValue) { | ||
try { | ||
var /** @type {?} */ value = (this._jwt.decodeToken()[claim]); | ||
if (value === undefined) { | ||
return defaultValue; | ||
} | ||
return value; | ||
} | ||
catch (e) { | ||
return defaultValue; | ||
} | ||
}; | ||
TokenService.decorators = [ | ||
{ type: core.Injectable }, | ||
]; | ||
/** @nocollapse */ | ||
TokenService.ctorParameters = function () { | ||
return [ | ||
{ type: angularJwt.JwtHelperService } | ||
]; | ||
}; | ||
return TokenService; | ||
}()); | ||
/** | ||
* @fileoverview added by tsickle | ||
* @suppress {checkTypes} checked by tsc | ||
*/ | ||
var /** @type {?} */ AAP_CONFIG = new core.InjectionToken('AAP_CONFIG'); | ||
/** | ||
* @return {?} | ||
*/ | ||
function getToken() { | ||
return localStorage.getItem('id_token') || ''; | ||
} | ||
AuthService.prototype.isAuthenticated = function () { | ||
return this._credentials.asObservable().pipe(operators.map(function (credentials) { return credentials ? true : false; })); | ||
/** | ||
* @return {?} | ||
*/ | ||
function removeToken() { | ||
return localStorage.removeItem('id_token'); | ||
} | ||
/** | ||
* @param {?} newToken | ||
* @return {?} | ||
*/ | ||
function updateToken(newToken) { | ||
return localStorage.setItem('id_token', newToken); | ||
} | ||
var /** @type {?} */ DEFAULT_CONF = { | ||
aapURL: 'https://api.aai.ebi.ac.uk', | ||
tokenGetter: getToken, | ||
tokenRemover: removeToken, | ||
tokenUpdater: updateToken | ||
}; | ||
AuthService.prototype.credentials = function () { | ||
return this._credentials.asObservable(); | ||
}; | ||
AuthService.prototype.realname = function () { | ||
return this._credentials.asObservable().pipe(operators.map(function (credentials) { return credentials ? credentials.realname : null; })); | ||
}; | ||
AuthService.prototype.username = function () { | ||
return this._credentials.asObservable().pipe(operators.map(function (credentials) { return credentials ? credentials.username : null; })); | ||
}; | ||
AuthService.prototype.token = function () { | ||
return this._credentials.asObservable().pipe(operators.map(function (credentials) { return credentials ? credentials.token : null; })); | ||
}; | ||
AuthService.prototype.windowOpen = function (loginOptions, width, height, top, left) { | ||
if (width === void 0) { width = 650; } | ||
if (height === void 0) { height = 1000; } | ||
if (top === void 0) { top = -1; } | ||
if (left === void 0) { left = -1; } | ||
if (left < 0) { | ||
var screenWidth = screen.width; | ||
if (screenWidth > width) { | ||
left = Math.round(screenWidth / 2 - width / 2); | ||
/** | ||
* @fileoverview added by tsickle | ||
* @suppress {checkTypes} checked by tsc | ||
*/ | ||
var AuthService = (function () { | ||
function AuthService(_rendererFactory, _tokenService, config) { | ||
var _this = this; | ||
this._rendererFactory = _rendererFactory; | ||
this._tokenService = _tokenService; | ||
this.config = config; | ||
this._credentials = new rxjs.BehaviorSubject(null); | ||
this._loginCallbacks = []; | ||
this._logoutCallbacks = []; | ||
this._timeoutID = null; | ||
this._commKeyName = 'AngularAapAuthUpdated'; | ||
this._commKeyUpdater = function () { return localStorage.setItem(_this._commKeyName, '' + new Date().getTime()); }; | ||
this._domain = encodeURIComponent(window.location.origin); | ||
this._appURL = config.aapURL.replace(/\/$/, ''); | ||
this._storageUpdater = config.tokenUpdater; | ||
if (config.tokenRemover) { | ||
this._storageRemover = config.tokenRemover; | ||
} | ||
} | ||
if (top < 0) { | ||
var screenHeight = screen.height; | ||
if (screenHeight > height) { | ||
top = Math.round(screenHeight / 2 - height / 2); | ||
else { | ||
this._storageRemover = function () { return config.tokenUpdater(null); }; | ||
} | ||
var /** @type {?} */ renderer = this._rendererFactory.createRenderer(null, null); | ||
this._listenLoginMessage(renderer); | ||
this._listenChangesFromOtherWindows(renderer); | ||
this._updateCredentials(); // TODO: experiment with setTimeOut | ||
} | ||
var windowOptions = [ | ||
"width=" + width, | ||
"height=" + height, | ||
"left=" + left, | ||
"top=" + top, | ||
'personalbar=no', | ||
'toolbar=no', | ||
'scrollbars=yes', | ||
'resizable=yes', | ||
'directories=no', | ||
'location=no', | ||
'menubar=no', | ||
'titlebar=no', | ||
'toolbar=no' | ||
/** | ||
* @return {?} | ||
*/ | ||
AuthService.prototype.isAuthenticated = /** | ||
* @return {?} | ||
*/ | ||
function () { | ||
return this._credentials.asObservable().pipe(operators.map(function (credentials) { return credentials ? true : false; })); | ||
}; | ||
/** | ||
* @return {?} | ||
*/ | ||
AuthService.prototype.credentials = /** | ||
* @return {?} | ||
*/ | ||
function () { | ||
return this._credentials.asObservable(); | ||
}; | ||
/** | ||
* @return {?} | ||
*/ | ||
AuthService.prototype.realname = /** | ||
* @return {?} | ||
*/ | ||
function () { | ||
return this._credentials.asObservable().pipe(operators.map(function (credentials) { return credentials ? credentials.realname : null; })); | ||
}; | ||
/** | ||
* @return {?} | ||
*/ | ||
AuthService.prototype.username = /** | ||
* @return {?} | ||
*/ | ||
function () { | ||
return this._credentials.asObservable().pipe(operators.map(function (credentials) { return credentials ? credentials.username : null; })); | ||
}; | ||
/** | ||
* @return {?} | ||
*/ | ||
AuthService.prototype.token = /** | ||
* @return {?} | ||
*/ | ||
function () { | ||
return this._credentials.asObservable().pipe(operators.map(function (credentials) { return credentials ? credentials.token : null; })); | ||
}; | ||
/** | ||
* Functions that opens a window instead of a tab. | ||
* | ||
* See method _filterLoginOptions regarding security risks of certain | ||
* LoginOptions. | ||
* | ||
* @param {?=} loginOptions Options passed as URL parameters to the SSO. | ||
* @param {?=} width Pixel width of the login window. | ||
* @param {?=} height Pixel height of the login window. | ||
* @param {?=} top Position of the top corners. If it is a negative | ||
* number it centres the login window on the screen. | ||
* @param {?=} left Position of the left corners. If it is a negative | ||
* number it centres the login window on the screen. | ||
* @return {?} | ||
*/ | ||
AuthService.prototype.windowOpen = /** | ||
* Functions that opens a window instead of a tab. | ||
* | ||
* See method _filterLoginOptions regarding security risks of certain | ||
* LoginOptions. | ||
* | ||
* @param {?=} loginOptions Options passed as URL parameters to the SSO. | ||
* @param {?=} width Pixel width of the login window. | ||
* @param {?=} height Pixel height of the login window. | ||
* @param {?=} top Position of the top corners. If it is a negative | ||
* number it centres the login window on the screen. | ||
* @param {?=} left Position of the left corners. If it is a negative | ||
* number it centres the login window on the screen. | ||
* @return {?} | ||
*/ | ||
function (loginOptions, width, height, top, left) { | ||
if (width === void 0) { | ||
width = 650; | ||
} | ||
if (height === void 0) { | ||
height = 1000; | ||
} | ||
if (top === void 0) { | ||
top = -1; | ||
} | ||
if (left === void 0) { | ||
left = -1; | ||
} | ||
if (left < 0) { | ||
var /** @type {?} */ screenWidth = screen.width; | ||
if (screenWidth > width) { | ||
left = Math.round(screenWidth / 2 - width / 2); | ||
} | ||
} | ||
if (top < 0) { | ||
var /** @type {?} */ screenHeight = screen.height; | ||
if (screenHeight > height) { | ||
top = Math.round(screenHeight / 2 - height / 2); | ||
} | ||
} | ||
var /** @type {?} */ windowOptions = [ | ||
"width=" + width, | ||
"height=" + height, | ||
"left=" + left, | ||
"top=" + top, | ||
'personalbar=no', | ||
'toolbar=no', | ||
'scrollbars=yes', | ||
'resizable=yes', | ||
'directories=no', | ||
'location=no', | ||
'menubar=no', | ||
'titlebar=no', | ||
'toolbar=no' | ||
]; | ||
var /** @type {?} */ loginWindow = window.open(this.getSSOURL(loginOptions), 'Sign in to Elixir', windowOptions.join(',')); | ||
if (loginWindow) { | ||
loginWindow.focus(); | ||
} | ||
}; | ||
/** | ||
* Functions that opens a tab (in modern browser). | ||
* | ||
* See method _filterLoginOptions regarding security risks of certain | ||
* LoginOptions. | ||
* | ||
* @param {?=} loginOptions Options passed as URL parameters to the SSO. | ||
* @return {?} | ||
*/ | ||
AuthService.prototype.tabOpen = /** | ||
* Functions that opens a tab (in modern browser). | ||
* | ||
* See method _filterLoginOptions regarding security risks of certain | ||
* LoginOptions. | ||
* | ||
* @param {?=} loginOptions Options passed as URL parameters to the SSO. | ||
* @return {?} | ||
*/ | ||
function (loginOptions) { | ||
var /** @type {?} */ loginWindow = window.open(this.getSSOURL(loginOptions), 'Sign in to Elixir'); | ||
if (loginWindow) { | ||
loginWindow.focus(); | ||
} | ||
}; | ||
/** | ||
* Produces a URL that allows logging into the single sign on (SSO) page. | ||
* The URL cans be opened in a new tab using target="_blank", | ||
* or in a new window using window.open(). | ||
* | ||
* See method _filterLoginOptions regarding security risks of certain | ||
* LoginOptions. | ||
* | ||
* @param {?=} options | ||
* @return {?} The SSO URL. | ||
* | ||
*/ | ||
AuthService.prototype.getSSOURL = /** | ||
* Produces a URL that allows logging into the single sign on (SSO) page. | ||
* The URL cans be opened in a new tab using target="_blank", | ||
* or in a new window using window.open(). | ||
* | ||
* See method _filterLoginOptions regarding security risks of certain | ||
* LoginOptions. | ||
* | ||
* @param {?=} options | ||
* @return {?} The SSO URL. | ||
* | ||
*/ | ||
function (options) { | ||
var /** @type {?} */ extra = ''; | ||
if (options) { | ||
this._filterLoginOptions(options); | ||
extra = Object.keys(options) | ||
.map(function (key) { return [key, options[key]]; }) | ||
.reduce(function (accumulator, keyvalue) { return accumulator + "&" + keyvalue[0] + "=" + keyvalue[1]; }, ''); | ||
} | ||
return this._appURL + "/sso?from=" + this._domain + extra; | ||
}; | ||
/** | ||
* Filters options that are unsecure. | ||
* | ||
* See the advance options that can be requested through the options parameter: | ||
* https://api.aai.ebi.ac.uk/docs/authentication/authentication.index.html#_common_attributes | ||
* | ||
* The time to live paramenter (ttl) default value is 60 minutes. It is a | ||
* big security risk to request longer ttl. If a third party gets hold of | ||
* such token, means that they could use it for a day, week, year | ||
* (essentially, like having the username/password). | ||
* | ||
* @param {?} options | ||
* @return {?} | ||
*/ | ||
AuthService.prototype._filterLoginOptions = /** | ||
* Filters options that are unsecure. | ||
* | ||
* See the advance options that can be requested through the options parameter: | ||
* https://api.aai.ebi.ac.uk/docs/authentication/authentication.index.html#_common_attributes | ||
* | ||
* The time to live paramenter (ttl) default value is 60 minutes. It is a | ||
* big security risk to request longer ttl. If a third party gets hold of | ||
* such token, means that they could use it for a day, week, year | ||
* (essentially, like having the username/password). | ||
* | ||
* @param {?} options | ||
* @return {?} | ||
*/ | ||
function (options) { | ||
if (Object.keys(options).indexOf('ttl') > -1) { | ||
var /** @type {?} */ ttl = +options['ttl']; | ||
var /** @type {?} */ softLimit = 60; | ||
var /** @type {?} */ hardLimit = 60 * 24; | ||
if (ttl > hardLimit) { | ||
window.console.error("Login requested with an expiration longer than " + hardLimit + " minutes! This is not allowed."); | ||
window.console.error("Expiration request reset to " + hardLimit + " minutes."); | ||
options['ttl'] = '' + hardLimit; | ||
} | ||
else if (ttl > softLimit) { | ||
window.console.warn("Login requested with an expiration longer than " + softLimit + " minutes!"); | ||
} | ||
} | ||
}; | ||
/** | ||
* Functions that logs out the user. | ||
* It triggers the logout callbacks. | ||
* It is an arrow function (lambda) because in that way it has a reference | ||
* to 'this' when used in setTimeout call. | ||
* @return {?} | ||
*/ | ||
AuthService.prototype.logOut = /** | ||
* Functions that logs out the user. | ||
* It triggers the logout callbacks. | ||
* It is an arrow function (lambda) because in that way it has a reference | ||
* to 'this' when used in setTimeout call. | ||
* @return {?} | ||
*/ | ||
function () { | ||
this._storageRemover(); | ||
this._updateCredentials(); | ||
// Triggers updating other windows | ||
this._commKeyUpdater(); | ||
}; | ||
/** | ||
* Add a callback to the LogIn event. | ||
* | ||
* @param {?} callback The Function called when the login event is triggered and the | ||
* JWT token is received and accepted. | ||
* | ||
* @return {?} The event registration id (necessary to unregister the event). | ||
*/ | ||
AuthService.prototype.addLogInEventListener = /** | ||
* Add a callback to the LogIn event. | ||
* | ||
* @param {?} callback The Function called when the login event is triggered and the | ||
* JWT token is received and accepted. | ||
* | ||
* @return {?} The event registration id (necessary to unregister the event). | ||
*/ | ||
function (callback) { | ||
return this._loginCallbacks.push(callback); | ||
}; | ||
/** | ||
* Remove a callback from the LogIn event. | ||
* | ||
* @param {?} id The id given when event listener was added. | ||
* | ||
* @return {?} true when remove successfully, false otherwise. | ||
*/ | ||
AuthService.prototype.removeLogInEventListener = /** | ||
* Remove a callback from the LogIn event. | ||
* | ||
* @param {?} id The id given when event listener was added. | ||
* | ||
* @return {?} true when remove successfully, false otherwise. | ||
*/ | ||
function (id) { | ||
return delete this._loginCallbacks[id - 1]; | ||
}; | ||
/** | ||
* Add a callback to the LogOut event. | ||
* | ||
* @param {?} callback The Function called when the logout event is triggered and the | ||
* JWT token is received and accepted. | ||
* | ||
* @return {?} The registration id (necessary to unregister the event). | ||
*/ | ||
AuthService.prototype.addLogOutEventListener = /** | ||
* Add a callback to the LogOut event. | ||
* | ||
* @param {?} callback The Function called when the logout event is triggered and the | ||
* JWT token is received and accepted. | ||
* | ||
* @return {?} The registration id (necessary to unregister the event). | ||
*/ | ||
function (callback) { | ||
return this._logoutCallbacks.push(callback); | ||
}; | ||
/** | ||
* Remove a callback from the LogOut event. | ||
* | ||
* @param {?} id The id given when event listener was added. | ||
* | ||
* @return {?} true when remove successfully, false otherwise. | ||
*/ | ||
AuthService.prototype.removeLogOutEventListener = /** | ||
* Remove a callback from the LogOut event. | ||
* | ||
* @param {?} id The id given when event listener was added. | ||
* | ||
* @return {?} true when remove successfully, false otherwise. | ||
*/ | ||
function (id) { | ||
return delete this._logoutCallbacks[id - 1]; | ||
}; | ||
/** | ||
* Listen for login messages from other windows. | ||
* These messages contain the tokens from the AAP. | ||
* If a token is received then the callbacks are triggered. | ||
* @param {?} renderer | ||
* @return {?} | ||
*/ | ||
AuthService.prototype._listenLoginMessage = /** | ||
* Listen for login messages from other windows. | ||
* These messages contain the tokens from the AAP. | ||
* If a token is received then the callbacks are triggered. | ||
* @param {?} renderer | ||
* @return {?} | ||
*/ | ||
function (renderer) { | ||
var _this = this; | ||
renderer.listen('window', 'message', function (event) { | ||
if (!_this.messageIsAcceptable(event)) { | ||
return; | ||
} | ||
_this._storageUpdater(event.data); | ||
event.source.close(); | ||
_this._updateCredentials(); | ||
// Triggers updating other windows | ||
// Triggers updating other windows | ||
_this._commKeyUpdater(); | ||
}); | ||
}; | ||
/** | ||
* Listen to changes in the token from *other* windows. | ||
* | ||
* For inter-window communication messages are transmitted trough changes | ||
* on a dummy storage key property: '_commKeyName'. | ||
* | ||
* Notice that changes in the '_commKeyName' produced by this class doesn't | ||
* trigger this event. | ||
* @param {?} renderer | ||
* @return {?} | ||
*/ | ||
AuthService.prototype._listenChangesFromOtherWindows = /** | ||
* Listen to changes in the token from *other* windows. | ||
* | ||
* For inter-window communication messages are transmitted trough changes | ||
* on a dummy storage key property: '_commKeyName'. | ||
* | ||
* Notice that changes in the '_commKeyName' produced by this class doesn't | ||
* trigger this event. | ||
* @param {?} renderer | ||
* @return {?} | ||
*/ | ||
function (renderer) { | ||
var _this = this; | ||
renderer.listen('window', 'storage', function (event) { | ||
if (event.key === _this._commKeyName) { | ||
_this._updateCredentials(); | ||
} | ||
}); | ||
}; | ||
/** | ||
* Check if the message is coming from the same domain we use to generate | ||
* the SSO URL, otherwise it's iffy and shouldn't trust it. | ||
* @param {?} event | ||
* @return {?} | ||
*/ | ||
AuthService.prototype.messageIsAcceptable = /** | ||
* Check if the message is coming from the same domain we use to generate | ||
* the SSO URL, otherwise it's iffy and shouldn't trust it. | ||
* @param {?} event | ||
* @return {?} | ||
*/ | ||
function (event) { | ||
return event.origin === this._appURL; | ||
}; | ||
/** | ||
* @return {?} | ||
*/ | ||
AuthService.prototype._updateCredentials = /** | ||
* @return {?} | ||
*/ | ||
function () { | ||
var _this = this; | ||
var /** @type {?} */ isAuthenticated = this._loggedIn(); | ||
if (this._timeoutID) { | ||
window.clearTimeout(this._timeoutID); | ||
} | ||
if (isAuthenticated) { | ||
this._credentials.next({ | ||
realname: /** @type {?} */ (this._getRealName()), | ||
username: /** @type {?} */ (this._getUserName()), | ||
token: /** @type {?} */ (this._getToken()) | ||
}); | ||
this._loginCallbacks.map(function (callback) { return callback && callback(); }); | ||
// Schedule future logout event base on token expiration | ||
var /** @type {?} */ expireDate = (this._tokenService.getTokenExpirationDate()); | ||
// Coercing dates to numbers with the unary operator '+' | ||
var /** @type {?} */ delay = +expireDate - +new Date(); | ||
this._timeoutID = window.setTimeout(function () { return _this.logOut(); }, delay); | ||
} | ||
else { | ||
this._storageRemover(); // Cleanup possible left behind token | ||
this._credentials.next(null); | ||
this._logoutCallbacks.map(function (callback) { return callback && callback(); }); | ||
} | ||
}; | ||
/** | ||
* Check if there's a user logging on and whether the token is still valid. | ||
* | ||
* @return {?} Whether the user user is authenticated or not. | ||
*/ | ||
AuthService.prototype._loggedIn = /** | ||
* Check if there's a user logging on and whether the token is still valid. | ||
* | ||
* @return {?} Whether the user user is authenticated or not. | ||
*/ | ||
function () { | ||
return this._tokenService.isTokenValid(); | ||
}; | ||
/** | ||
* @return {?} | ||
*/ | ||
AuthService.prototype._getToken = /** | ||
* @return {?} | ||
*/ | ||
function () { | ||
return this._tokenService.getToken(); | ||
}; | ||
/** | ||
* @return {?} | ||
*/ | ||
AuthService.prototype._getUserName = /** | ||
* @return {?} | ||
*/ | ||
function () { | ||
return this._tokenService.getClaim('email', null); | ||
}; | ||
/** | ||
* @return {?} | ||
*/ | ||
AuthService.prototype._getRealName = /** | ||
* @return {?} | ||
*/ | ||
function () { | ||
return this._tokenService.getClaim('name', null); | ||
}; | ||
AuthService.decorators = [ | ||
{ type: core.Injectable }, | ||
]; | ||
var loginWindow = window.open(this.getSSOURL(loginOptions), 'Sign in to Elixir', windowOptions.join(',')); | ||
if (loginWindow) { | ||
loginWindow.focus(); | ||
} | ||
}; | ||
AuthService.prototype.tabOpen = function (loginOptions) { | ||
var loginWindow = window.open(this.getSSOURL(loginOptions), 'Sign in to Elixir'); | ||
if (loginWindow) { | ||
loginWindow.focus(); | ||
} | ||
}; | ||
AuthService.prototype.getSSOURL = function (options) { | ||
var extra = ''; | ||
if (options) { | ||
this._filterLoginOptions(options); | ||
extra = Object.keys(options) | ||
.map(function (key) { return [key, options[key]]; }) | ||
.reduce(function (accumulator, keyvalue) { return accumulator + "&" + keyvalue[0] + "=" + keyvalue[1]; }, ''); | ||
} | ||
return this._appURL + "/sso?from=" + this._domain + extra; | ||
}; | ||
AuthService.prototype._filterLoginOptions = function (options) { | ||
if (Object.keys(options).indexOf('ttl') > -1) { | ||
var ttl = +options['ttl']; | ||
var softLimit = 60; | ||
var hardLimit = 60 * 24; | ||
if (ttl > hardLimit) { | ||
window.console.error("Login requested with an expiration longer than " + hardLimit + " minutes! This is not allowed."); | ||
window.console.error("Expiration request reset to " + hardLimit + " minutes."); | ||
options['ttl'] = '' + hardLimit; | ||
/** @nocollapse */ | ||
AuthService.ctorParameters = function () { | ||
return [ | ||
{ type: core.RendererFactory2 }, | ||
{ type: TokenService }, | ||
{ type: undefined, decorators: [{ type: core.Inject, args: [AAP_CONFIG,] }] } | ||
]; | ||
}; | ||
return AuthService; | ||
}()); | ||
/** | ||
* @fileoverview added by tsickle | ||
* @suppress {checkTypes} checked by tsc | ||
*/ | ||
var AuthModule = (function () { | ||
function AuthModule(parentModule) { | ||
if (parentModule) { | ||
throw new Error('AuthModule is already loaded. It should only be imported in your application\'s main module.'); | ||
} | ||
else if (ttl > softLimit) { | ||
window.console.warn("Login requested with an expiration longer than " + softLimit + " minutes!"); | ||
} | ||
} | ||
}; | ||
AuthService.prototype.logOut = function () { | ||
this._storageRemover(); | ||
this._updateCredentials(); | ||
this._commKeyUpdater(); | ||
}; | ||
AuthService.prototype.addLogInEventListener = function (callback) { | ||
return this._loginCallbacks.push(callback); | ||
}; | ||
AuthService.prototype.removeLogInEventListener = function (id) { | ||
return delete this._loginCallbacks[id - 1]; | ||
}; | ||
AuthService.prototype.addLogOutEventListener = function (callback) { | ||
return this._logoutCallbacks.push(callback); | ||
}; | ||
AuthService.prototype.removeLogOutEventListener = function (id) { | ||
return delete this._logoutCallbacks[id - 1]; | ||
}; | ||
AuthService.prototype._listenLoginMessage = function (renderer) { | ||
var _this = this; | ||
renderer.listen('window', 'message', function (event) { | ||
if (!_this.messageIsAcceptable(event)) { | ||
return; | ||
} | ||
_this._storageUpdater(event.data); | ||
event.source.close(); | ||
_this._updateCredentials(); | ||
_this._commKeyUpdater(); | ||
}); | ||
}; | ||
AuthService.prototype._listenChangesFromOtherWindows = function (renderer) { | ||
var _this = this; | ||
renderer.listen('window', 'storage', function (event) { | ||
if (event.key === _this._commKeyName) { | ||
_this._updateCredentials(); | ||
} | ||
}); | ||
}; | ||
AuthService.prototype.messageIsAcceptable = function (event) { | ||
return event.origin === this._appURL; | ||
}; | ||
AuthService.prototype._updateCredentials = function () { | ||
var _this = this; | ||
var isAuthenticated = this._loggedIn(); | ||
if (this._timeoutID) { | ||
window.clearTimeout(this._timeoutID); | ||
} | ||
if (isAuthenticated) { | ||
this._credentials.next({ | ||
realname: (this._getRealName()), | ||
username: (this._getUserName()), | ||
token: (this._getToken()) | ||
}); | ||
this._loginCallbacks.map(function (callback) { return callback && callback(); }); | ||
var expireDate = (this._tokenService.getTokenExpirationDate()); | ||
var delay = +expireDate - +new Date(); | ||
this._timeoutID = window.setTimeout(function () { return _this.logOut(); }, delay); | ||
} | ||
else { | ||
this._storageRemover(); | ||
this._credentials.next(null); | ||
this._logoutCallbacks.map(function (callback) { return callback && callback(); }); | ||
} | ||
}; | ||
AuthService.prototype._loggedIn = function () { | ||
return this._tokenService.isTokenValid(); | ||
}; | ||
AuthService.prototype._getToken = function () { | ||
return this._tokenService.getToken(); | ||
}; | ||
AuthService.prototype._getUserName = function () { | ||
return this._tokenService.getClaim('email', null); | ||
}; | ||
AuthService.prototype._getRealName = function () { | ||
return this._tokenService.getClaim('name', null); | ||
}; | ||
return AuthService; | ||
}()); | ||
AuthService.decorators = [ | ||
{ type: core.Injectable }, | ||
]; | ||
AuthService.ctorParameters = function () { return [ | ||
{ type: core.RendererFactory2, }, | ||
{ type: TokenService, }, | ||
{ type: undefined, decorators: [{ type: core.Inject, args: [AAP_CONFIG,] },] }, | ||
]; }; | ||
var AuthModule = /** @class */ (function () { | ||
function AuthModule(parentModule) { | ||
if (parentModule) { | ||
throw new Error('AuthModule is already loaded. It should only be imported in your application\'s main module.'); | ||
} | ||
} | ||
AuthModule.forRoot = function (options) { | ||
return { | ||
ngModule: AuthModule, | ||
providers: [ | ||
TokenService, | ||
{ | ||
provide: AAP_CONFIG, | ||
useValue: options ? options : DEFAULT_CONF | ||
}, | ||
AuthService | ||
] | ||
/** | ||
* @param {?=} options | ||
* @return {?} | ||
*/ | ||
AuthModule.forRoot = /** | ||
* @param {?=} options | ||
* @return {?} | ||
*/ | ||
function (options) { | ||
return { | ||
ngModule: AuthModule, | ||
providers: [ | ||
TokenService, | ||
{ | ||
provide: AAP_CONFIG, | ||
useValue: options ? options : DEFAULT_CONF | ||
}, | ||
AuthService | ||
] | ||
}; | ||
}; | ||
AuthModule.decorators = [ | ||
{ type: core.NgModule, args: [{},] }, | ||
]; | ||
/** @nocollapse */ | ||
AuthModule.ctorParameters = function () { | ||
return [ | ||
{ type: AuthModule, decorators: [{ type: core.Optional }, { type: core.SkipSelf }] } | ||
]; | ||
}; | ||
}; | ||
return AuthModule; | ||
}()); | ||
AuthModule.decorators = [ | ||
{ type: core.NgModule, args: [{},] }, | ||
]; | ||
AuthModule.ctorParameters = function () { return [ | ||
{ type: AuthModule, decorators: [{ type: core.Optional }, { type: core.SkipSelf },] }, | ||
]; }; | ||
return AuthModule; | ||
}()); | ||
exports.AuthModule = AuthModule; | ||
exports.AuthService = AuthService; | ||
exports.TokenService = TokenService; | ||
exports.ɵb = AAP_CONFIG; | ||
exports.ɵf = DEFAULT_CONF; | ||
exports.ɵc = getToken; | ||
exports.ɵd = removeToken; | ||
exports.ɵe = updateToken; | ||
/** | ||
* @fileoverview added by tsickle | ||
* @suppress {checkTypes} checked by tsc | ||
*/ | ||
Object.defineProperty(exports, '__esModule', { value: true }); | ||
/** | ||
* @fileoverview added by tsickle | ||
* @suppress {checkTypes} checked by tsc | ||
*/ | ||
exports.AuthModule = AuthModule; | ||
exports.AuthService = AuthService; | ||
exports.TokenService = TokenService; | ||
exports.ɵb = AAP_CONFIG; | ||
exports.ɵf = DEFAULT_CONF; | ||
exports.ɵc = getToken; | ||
exports.ɵd = removeToken; | ||
exports.ɵe = updateToken; | ||
Object.defineProperty(exports, '__esModule', { value: true }); | ||
}))); | ||
//# sourceMappingURL=angular-aap-auth.umd.js.map | ||
//# sourceMappingURL=data:application/json;charset=utf-8;base64,{"version":3,"file":"angular-aap-auth.umd.js.map","sources":["ng://angular-aap-auth/app/modules/auth/token.service.ts","ng://angular-aap-auth/app/modules/auth/auth.config.ts","ng://angular-aap-auth/app/modules/auth/auth.service.ts","ng://angular-aap-auth/app/modules/auth/auth.module.ts"],"sourcesContent":["import {\n    Injectable\n} from '@angular/core';\n\nimport {\n    JwtHelperService\n} from '@auth0/angular-jwt';\n\n/**\n * The purpose of this very simple service is to interface between the\n * AuthService and the specific token manipulation routing of JwtHelperService.\n * In this way, if in the future we want to replace JwtHelperService by\n * another service, AuthService doesn't need to be modified, only this service.\n */\n@Injectable()\nexport class TokenService {\n\n    constructor(\n        private _jwt: JwtHelperService\n    ) {}\n\n    public getToken(): string | null {\n        return this._jwt.tokenGetter();\n    }\n\n    public getTokenExpirationDate(): Date | null {\n        try {\n            return this._jwt.getTokenExpirationDate();\n        } catch (e) {\n            return null;\n        }\n    }\n\n    public isTokenValid(): boolean {\n        try {\n            return !this._jwt.isTokenExpired();\n        } catch (error) {\n            return false;\n        }\n    }\n\n    /**\n     * Get claims from the token.\n     *\n     * @param claim The name of the claim\n     * @param defaultValue The default value returned in case of error\n     *\n     * @returns claim or default value\n     */\n    public getClaim < T, C > (claim: string, defaultValue: C): T | C {\n        try {\n            const value = < T > this._jwt.decodeToken()[claim];\n            if (value === undefined) {\n                return defaultValue;\n            }\n            return value;\n        } catch (e) {\n            return defaultValue;\n        }\n    }\n}\n","import {\n    InjectionToken\n} from '@angular/core';\n\nexport interface AuthConfig {\n    aapURL: string;\n    tokenGetter: () => string;\n    tokenRemover?: () => void;\n    tokenUpdater: (newToken: any) => void;\n}\n\nexport const AAP_CONFIG = new InjectionToken < AuthConfig > ('AAP_CONFIG');\n\nexport function getToken(): string {\n    return localStorage.getItem('id_token') || '';\n}\nexport function removeToken(): void {\n    return localStorage.removeItem('id_token');\n}\nexport function updateToken(newToken: string): void {\n    return localStorage.setItem('id_token', newToken);\n}\nexport const DEFAULT_CONF: AuthConfig = {\n    aapURL: 'https://api.aai.ebi.ac.uk',\n    tokenGetter: getToken,\n    tokenRemover: removeToken,\n    tokenUpdater: updateToken\n};\n","import {\n    Injectable,\n    Inject,\n    RendererFactory2,\n    Renderer2\n} from '@angular/core';\nimport {\n    Observable\n} from 'rxjs';\nimport {\n    BehaviorSubject,\n} from 'rxjs';\nimport {\n    map\n} from 'rxjs/operators';\n\nimport {\n    AAP_CONFIG,\n    AuthConfig\n} from './auth.config';\nimport {\n    TokenService\n} from './token.service';\n\nexport interface LoginOptions {\n    [key: string]: string;\n}\n\nexport interface Credentials {\n    realname: string;\n    username: string;\n    token: string;\n}\n\n@Injectable()\nexport class AuthService {\n\n    private _credentials = new BehaviorSubject < Credentials | null > (null);\n\n    private _loginCallbacks: Function[] = [];\n    private _logoutCallbacks: Function[] = [];\n\n    private _timeoutID: number | null = null;\n\n    // Configuration\n    private readonly _domain: string;\n    private readonly _appURL: string;\n    private readonly _storageUpdater: (newToken: any) => void;\n    private readonly _storageRemover: () => void;\n\n    // This two properties are used for inter-window communcation.\n    // It is achieve through the update of the dummy key storage '_commKeyName'\n    private readonly _commKeyName = 'AngularAapAuthUpdated';\n    private readonly _commKeyUpdater = () => localStorage.setItem(this._commKeyName, '' + new Date().getTime());\n\n    constructor(\n        private _rendererFactory: RendererFactory2,\n        private _tokenService: TokenService,\n        @Inject(AAP_CONFIG) private config: AuthConfig\n    ) {\n        this._domain = encodeURIComponent(window.location.origin);\n        this._appURL = config.aapURL.replace(/\\/$/, '');\n        this._storageUpdater = config.tokenUpdater;\n        if (config.tokenRemover) {\n            this._storageRemover = config.tokenRemover;\n        } else {\n            this._storageRemover = () => config.tokenUpdater(null);\n        }\n\n        const renderer = this._rendererFactory.createRenderer(null, null);\n        this._listenLoginMessage(renderer);\n        this._listenChangesFromOtherWindows(renderer);\n\n        this._updateCredentials(); // TODO: experiment with setTimeOut\n    }\n\n    public isAuthenticated(): Observable < boolean > {\n        return this._credentials.asObservable().pipe(\n            map(credentials => credentials ? true : false)\n        );\n    }\n\n    public credentials(): Observable < Credentials | null > {\n        return this._credentials.asObservable();\n    }\n\n    public realname(): Observable < string | null > {\n        return this._credentials.asObservable().pipe(\n            map(credentials => credentials ?  credentials.realname : null)\n        );\n    }\n\n    public username(): Observable < string | null > {\n        return this._credentials.asObservable().pipe(\n            map(credentials => credentials ?  credentials.username : null)\n        );\n    }\n\n    public token(): Observable < string | null > {\n        return this._credentials.asObservable().pipe(\n            map(credentials => credentials ?  credentials.token : null)\n        );\n    }\n\n    /**\n     * Functions that opens a window instead of a tab.\n     *\n     * See method _filterLoginOptions regarding security risks of certain\n     * LoginOptions.\n     *\n     * @param loginOptions Options passed as URL parameters to the SSO.\n     * @param width Pixel width of the login window.\n     * @param height Pixel height of the login window.\n     * @param top Position of the top corners. If it is a negative\n     *             number it centres the login window on the screen.\n     * @param left Position of the left corners. If it is a negative\n     *             number it centres the login window on the screen.\n     */\n    public windowOpen(loginOptions?: LoginOptions, width = 650, height = 1000, top = -1, left = -1) {\n        if (left < 0) {\n            const screenWidth = screen.width;\n            if (screenWidth > width) {\n                left = Math.round(screenWidth / 2 - width / 2);\n            }\n        }\n        if (top < 0) {\n            const screenHeight = screen.height;\n            if (screenHeight > height) {\n                top = Math.round(screenHeight / 2 - height / 2);\n            }\n        }\n\n        const windowOptions = [\n            `width=${width}`,\n            `height=${height}`,\n            `left=${left}`,\n            `top=${top}`,\n            'personalbar=no',\n            'toolbar=no',\n            'scrollbars=yes',\n            'resizable=yes',\n            'directories=no',\n            'location=no',\n            'menubar=no',\n            'titlebar=no',\n            'toolbar=no'\n        ];\n\n        const loginWindow = window.open(this.getSSOURL(loginOptions), 'Sign in to Elixir', windowOptions.join(','));\n        if (loginWindow) {\n            loginWindow.focus();\n        }\n    }\n\n    /**\n     * Functions that opens a tab (in modern browser).\n     *\n     * See method _filterLoginOptions regarding security risks of certain\n     * LoginOptions.\n     *\n     * @param loginOptions Options passed as URL parameters to the SSO.\n     */\n    public tabOpen(loginOptions?: LoginOptions) {\n        const loginWindow = window.open(this.getSSOURL(loginOptions), 'Sign in to Elixir');\n        if (loginWindow) {\n            loginWindow.focus();\n        }\n    }\n\n    /**\n     * Produces a URL that allows logging into the single sign on (SSO) page.\n     * The URL cans be opened in a new tab using target=\"_blank\",\n     * or in a new window using window.open().\n     *\n     * See method _filterLoginOptions regarding security risks of certain\n     * LoginOptions.\n     *\n     * @param  loginOptions Options passed as URL parameters to the SSO.\n     *\n     * @returns The SSO URL.\n     *\n     */\n        public getSSOURL(options?: LoginOptions): string {\n        let extra = '';\n        if (options) {\n            this._filterLoginOptions(options);\n            extra = Object.keys(options)\n                .map(key => [key, options[key]])\n                .reduce((accumulator, keyvalue) => `${accumulator}&${keyvalue[0]}=${keyvalue[1]}`, '');\n        }\n        return `${this._appURL}/sso?from=${this._domain}${extra}`;\n    }\n\n    /**\n     * Filters options that are unsecure.\n     *\n     * See the advance options that can be requested through the options parameter:\n     * https://api.aai.ebi.ac.uk/docs/authentication/authentication.index.html#_common_attributes\n     *\n     * The time to live paramenter (ttl) default value is 60 minutes. It is a\n     * big security risk to request longer ttl. If a third party gets hold of\n     * such token, means that they could use it for a day, week, year\n     * (essentially, like having the username/password).\n     *\n     * @param  loginOptions Options passed as URL parameters to the SSO.\n     *\n     *\n     */\n    public _filterLoginOptions(options: LoginOptions) {\n        if (Object.keys(options).indexOf('ttl') > -1) {\n            const ttl: number = +options['ttl'];\n            const softLimit = 60;\n            const hardLimit = 60 * 24;\n            if (ttl > hardLimit) {\n                window.console.error(`Login requested with an expiration longer than ${hardLimit} minutes! This is not allowed.`);\n                window.console.error(`Expiration request reset to ${hardLimit} minutes.`);\n                options['ttl'] = '' + hardLimit;\n            } else if (ttl > softLimit) {\n                window.console.warn(`Login requested with an expiration longer than ${softLimit} minutes!`);\n            }\n        }\n    }\n\n    /**\n     * Functions that logs out the user.\n     * It triggers the logout callbacks.\n     * It is an arrow function (lambda) because in that way it has a reference\n     * to 'this' when used in setTimeout call.\n     */\n    public logOut() {\n        this._storageRemover();\n        this._updateCredentials();\n\n        // Triggers updating other windows\n        this._commKeyUpdater();\n    }\n\n    /**\n     * Add a callback to the LogIn event.\n     *\n     * @param callback The Function called when the login event is triggered and the\n     *    JWT token is received and accepted.\n     *\n     * @returns The event registration id (necessary to unregister the event).\n     */\n    public addLogInEventListener(callback: Function): number {\n        return this._loginCallbacks.push(callback);\n    }\n\n    /**\n     * Remove a callback from the LogIn event.\n     *\n     * @param id The id given when event listener was added.\n     *\n     * @returns true when remove successfully, false otherwise.\n     */\n    public removeLogInEventListener(id: number): boolean {\n        return delete this._loginCallbacks[id - 1];\n    }\n\n    /**\n     * Add a callback to the LogOut event.\n     *\n     * @param callback The Function called when the logout event is triggered and the\n     *    JWT token is received and accepted.\n     *\n     * @returns The registration id (necessary to unregister the event).\n     */\n    public addLogOutEventListener(callback: Function): number {\n        return this._logoutCallbacks.push(callback);\n    }\n\n    /**\n     * Remove a callback from the LogOut event.\n     *\n     * @param id The id given when event listener was added.\n     *\n     * @returns true when remove successfully, false otherwise.\n     */\n    public removeLogOutEventListener(id: number): boolean {\n        return delete this._logoutCallbacks[id - 1];\n    }\n\n    /**\n     * Listen for login messages from other windows.\n     * These messages contain the tokens from the AAP.\n     * If a token is received then the callbacks are triggered.\n     */\n    private _listenLoginMessage(renderer: Renderer2) {\n        renderer.listen('window', 'message', (event: MessageEvent) => {\n            if (!this.messageIsAcceptable(event)) {\n                return;\n            }\n            this._storageUpdater(event.data);\n            event.source.close();\n            this._updateCredentials();\n\n            // Triggers updating other windows\n            this._commKeyUpdater();\n        });\n    }\n\n    /** Listen to changes in the token from *other* windows.\n     *\n     * For inter-window communication messages are transmitted trough changes\n     * on a dummy storage key property: '_commKeyName'.\n     *\n     * Notice that changes in the '_commKeyName' produced by this class doesn't\n     * trigger this event.\n     */\n    private _listenChangesFromOtherWindows(renderer: Renderer2) {\n        renderer.listen('window', 'storage', (event: StorageEvent) => {\n            if (event.key === this._commKeyName) {\n                this._updateCredentials();\n            }\n        });\n    }\n\n    /**\n     * Check if the message is coming from the same domain we use to generate\n     * the SSO URL, otherwise it's iffy and shouldn't trust it.\n     */\n    private messageIsAcceptable(event: MessageEvent): boolean {\n        return event.origin === this._appURL;\n    }\n\n    private _updateCredentials() {\n        const isAuthenticated = this._loggedIn();\n\n        if (this._timeoutID) {\n            window.clearTimeout(this._timeoutID);\n        }\n\n        if (isAuthenticated) {\n            this._credentials.next({\n                realname: < string > this._getRealName(),\n                username: < string > this._getUserName(),\n                token: < string > this._getToken()\n            });\n\n            this._loginCallbacks.map(callback => callback && callback());\n\n            // Schedule future logout event base on token expiration\n            const expireDate = < Date > this._tokenService.getTokenExpirationDate();\n            // Coercing dates to numbers with the unary operator '+'\n            const delay = +expireDate - +new Date();\n            this._timeoutID = window.setTimeout(() => this.logOut(), delay);\n        } else {\n            this._storageRemover(); // Cleanup possible left behind token\n            this._credentials.next(null);\n            this._logoutCallbacks.map(callback => callback && callback());\n        }\n    }\n\n    /**\n     * Check if there's a user logging on and whether the token is still valid.\n     *\n     * @returns  Whether the user user is authenticated or not.\n     */\n    private _loggedIn(): boolean {\n        return this._tokenService.isTokenValid();\n    }\n\n    private _getToken(): string | null {\n        return this._tokenService.getToken();\n    }\n\n    private _getUserName(): string | null {\n        return this._tokenService.getClaim < string, null > ('email', null);\n    }\n\n    private _getRealName(): string | null {\n        return this._tokenService.getClaim < string, null > ('name', null);\n    }\n\n}\n","import {\n    NgModule,\n    Optional,\n    SkipSelf,\n    ModuleWithProviders,\n} from '@angular/core';\n\nimport {\n    JWT_OPTIONS,\n    JwtHelperService\n} from '@auth0/angular-jwt';\nimport {\n    TokenService\n} from './token.service';\nimport {\n    AuthConfig,\n    AAP_CONFIG,\n    DEFAULT_CONF\n} from './auth.config';\nimport {\n    AuthService\n} from './auth.service';\n\n@NgModule({})\nexport class AuthModule {\n\n    constructor(@Optional() @SkipSelf() parentModule: AuthModule) {\n        if (parentModule) {\n            throw new Error('AuthModule is already loaded. It should only be imported in your application\\'s main module.');\n        }\n    }\n\n    static forRoot(options?: AuthConfig): ModuleWithProviders {\n        return {\n            ngModule: AuthModule,\n            providers: [\n                TokenService,\n                {\n                    provide: AAP_CONFIG,\n                    useValue: options ? options : DEFAULT_CONF\n                },\n                AuthService\n            ]\n        };\n    }\n}\n"],"names":["Injectable","JwtHelperService","InjectionToken","BehaviorSubject","map","RendererFactory2","Inject","NgModule","Optional","SkipSelf"],"mappings":";;;;;;;;;;AAAA;;;;;;;QAiBI,sBACY;YAAA,SAAI,GAAJ,IAAI;SACZ;;;;QAEG,+BAAQ;;;;gBACX,OAAO,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;;;;;QAG5B,6CAAsB;;;;gBACzB,IAAI;oBACA,OAAO,IAAI,CAAC,IAAI,CAAC,sBAAsB,EAAE,CAAC;iBAC7C;gBAAC,OAAO,CAAC,EAAE;oBACR,OAAO,IAAI,CAAC;iBACf;;;;;QAGE,mCAAY;;;;gBACf,IAAI;oBACA,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,cAAc,EAAE,CAAC;iBACtC;gBAAC,OAAO,KAAK,EAAE;oBACZ,OAAO,KAAK,CAAC;iBAChB;;;;;;;;;;;QAWE,+BAAQ;;;;;;;;;sBAAW,KAAa,EAAE,YAAe;gBACpD,IAAI;oBACA,qBAAM,KAAK,IAAS,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC,KAAK,CAAC,CAAA,CAAC;oBACnD,IAAI,KAAK,KAAK,SAAS,EAAE;wBACrB,OAAO,YAAY,CAAC;qBACvB;oBACD,OAAO,KAAK,CAAC;iBAChB;gBAAC,OAAO,CAAC,EAAE;oBACR,OAAO,YAAY,CAAC;iBACvB;;;oBA5CRA,eAAU;;;;;wBATPC,2BAAgB;;;2BALpB;;;;;;;ACAA,yBAWa,UAAU,GAAG,IAAIC,mBAAc,CAAiB,YAAY,CAAC,CAAC;;;;AAE3E;QACI,OAAO,YAAY,CAAC,OAAO,CAAC,UAAU,CAAC,IAAI,EAAE,CAAC;KACjD;;;;AACD;QACI,OAAO,YAAY,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC;KAC9C;;;;;AACD,yBAA4B,QAAgB;QACxC,OAAO,YAAY,CAAC,OAAO,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;KACrD;AACD,yBAAa,YAAY,GAAe;QACpC,MAAM,EAAE,2BAA2B;QACnC,WAAW,EAAE,QAAQ;QACrB,YAAY,EAAE,WAAW;QACzB,YAAY,EAAE,WAAW;KAC5B;;;;;;AC3BD;QAuDI,qBACY,kBACA,eACoB,MAAkB;YAHlD,iBAmBC;YAlBW,qBAAgB,GAAhB,gBAAgB;YAChB,kBAAa,GAAb,aAAa;YACO,WAAM,GAAN,MAAM,CAAY;gCArB3B,IAAIC,oBAAe,CAAyB,IAAI,CAAC;mCAElC,EAAE;oCACD,EAAE;8BAEL,IAAI;gCAUR,uBAAuB;mCACpB,cAAM,OAAA,YAAY,CAAC,OAAO,CAAC,KAAI,CAAC,YAAY,EAAE,EAAE,GAAG,IAAI,IAAI,EAAE,CAAC,OAAO,EAAE,CAAC,GAAA;YAOvG,IAAI,CAAC,OAAO,GAAG,kBAAkB,CAAC,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;YAC1D,IAAI,CAAC,OAAO,GAAG,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;YAChD,IAAI,CAAC,eAAe,GAAG,MAAM,CAAC,YAAY,CAAC;YAC3C,IAAI,MAAM,CAAC,YAAY,EAAE;gBACrB,IAAI,CAAC,eAAe,GAAG,MAAM,CAAC,YAAY,CAAC;aAC9C;iBAAM;gBACH,IAAI,CAAC,eAAe,GAAG,cAAM,OAAA,MAAM,CAAC,YAAY,CAAC,IAAI,CAAC,GAAA,CAAC;aAC1D;YAED,qBAAM,QAAQ,GAAG,IAAI,CAAC,gBAAgB,CAAC,cAAc,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;YAClE,IAAI,CAAC,mBAAmB,CAAC,QAAQ,CAAC,CAAC;YACnC,IAAI,CAAC,8BAA8B,CAAC,QAAQ,CAAC,CAAC;YAE9C,IAAI,CAAC,kBAAkB,EAAE,CAAC;SAC7B;;;;QAEM,qCAAe;;;;gBAClB,OAAO,IAAI,CAAC,YAAY,CAAC,YAAY,EAAE,CAAC,IAAI,CACxCC,aAAG,CAAC,UAAA,WAAW,IAAI,OAAA,WAAW,GAAG,IAAI,GAAG,KAAK,GAAA,CAAC,CACjD,CAAC;;;;;QAGC,iCAAW;;;;gBACd,OAAO,IAAI,CAAC,YAAY,CAAC,YAAY,EAAE,CAAC;;;;;QAGrC,8BAAQ;;;;gBACX,OAAO,IAAI,CAAC,YAAY,CAAC,YAAY,EAAE,CAAC,IAAI,CACxCA,aAAG,CAAC,UAAA,WAAW,IAAI,OAAA,WAAW,GAAI,WAAW,CAAC,QAAQ,GAAG,IAAI,GAAA,CAAC,CACjE,CAAC;;;;;QAGC,8BAAQ;;;;gBACX,OAAO,IAAI,CAAC,YAAY,CAAC,YAAY,EAAE,CAAC,IAAI,CACxCA,aAAG,CAAC,UAAA,WAAW,IAAI,OAAA,WAAW,GAAI,WAAW,CAAC,QAAQ,GAAG,IAAI,GAAA,CAAC,CACjE,CAAC;;;;;QAGC,2BAAK;;;;gBACR,OAAO,IAAI,CAAC,YAAY,CAAC,YAAY,EAAE,CAAC,IAAI,CACxCA,aAAG,CAAC,UAAA,WAAW,IAAI,OAAA,WAAW,GAAI,WAAW,CAAC,KAAK,GAAG,IAAI,GAAA,CAAC,CAC9D,CAAC;;;;;;;;;;;;;;;;;QAiBC,gCAAU;;;;;;;;;;;;;;;sBAAC,YAA2B,EAAE,KAAW,EAAE,MAAa,EAAE,GAAQ,EAAE,IAAS;gBAA/C,sBAAA;oBAAA,WAAW;;gBAAE,uBAAA;oBAAA,aAAa;;gBAAE,oBAAA;oBAAA,OAAO,CAAC;;gBAAE,qBAAA;oBAAA,QAAQ,CAAC;;gBAC1F,IAAI,IAAI,GAAG,CAAC,EAAE;oBACV,qBAAM,WAAW,GAAG,MAAM,CAAC,KAAK,CAAC;oBACjC,IAAI,WAAW,GAAG,KAAK,EAAE;wBACrB,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,GAAG,CAAC,GAAG,KAAK,GAAG,CAAC,CAAC,CAAC;qBAClD;iBACJ;gBACD,IAAI,GAAG,GAAG,CAAC,EAAE;oBACT,qBAAM,YAAY,GAAG,MAAM,CAAC,MAAM,CAAC;oBACnC,IAAI,YAAY,GAAG,MAAM,EAAE;wBACvB,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,YAAY,GAAG,CAAC,GAAG,MAAM,GAAG,CAAC,CAAC,CAAC;qBACnD;iBACJ;gBAED,qBAAM,aAAa,GAAG;oBAClB,WAAS,KAAO;oBAChB,YAAU,MAAQ;oBAClB,UAAQ,IAAM;oBACd,SAAO,GAAK;oBACZ,gBAAgB;oBAChB,YAAY;oBACZ,gBAAgB;oBAChB,eAAe;oBACf,gBAAgB;oBAChB,aAAa;oBACb,YAAY;oBACZ,aAAa;oBACb,YAAY;iBACf,CAAC;gBAEF,qBAAM,WAAW,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,EAAE,mBAAmB,EAAE,aAAa,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC;gBAC5G,IAAI,WAAW,EAAE;oBACb,WAAW,CAAC,KAAK,EAAE,CAAC;iBACvB;;;;;;;;;;;QAWE,6BAAO;;;;;;;;;sBAAC,YAA2B;gBACtC,qBAAM,WAAW,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,YAAY,CAAC,EAAE,mBAAmB,CAAC,CAAC;gBACnF,IAAI,WAAW,EAAE;oBACb,WAAW,CAAC,KAAK,EAAE,CAAC;iBACvB;;;;;;;;;;;;;;QAgBM,+BAAS;;;;;;;;;;;;sBAAC,OAAsB;gBACvC,qBAAI,KAAK,GAAG,EAAE,CAAC;gBACf,IAAI,OAAO,EAAE;oBACT,IAAI,CAAC,mBAAmB,CAAC,OAAO,CAAC,CAAC;oBAClC,KAAK,GAAG,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC;yBACvB,GAAG,CAAC,UAAA,GAAG,IAAI,OAAA,CAAC,GAAG,EAAE,OAAO,CAAC,GAAG,CAAC,CAAC,GAAA,CAAC;yBAC/B,MAAM,CAAC,UAAC,WAAW,EAAE,QAAQ,IAAK,OAAG,WAAW,SAAI,QAAQ,CAAC,CAAC,CAAC,SAAI,QAAQ,CAAC,CAAC,CAAG,GAAA,EAAE,EAAE,CAAC,CAAC;iBAC9F;gBACD,OAAU,IAAI,CAAC,OAAO,kBAAa,IAAI,CAAC,OAAO,GAAG,KAAO,CAAC;;;;;;;;;;;;;;;;QAkBvD,yCAAmB;;;;;;;;;;;;;;sBAAC,OAAqB;gBAC5C,IAAI,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,OAAO,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,EAAE;oBAC1C,qBAAM,GAAG,GAAW,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC;oBACpC,qBAAM,SAAS,GAAG,EAAE,CAAC;oBACrB,qBAAM,SAAS,GAAG,EAAE,GAAG,EAAE,CAAC;oBAC1B,IAAI,GAAG,GAAG,SAAS,EAAE;wBACjB,MAAM,CAAC,OAAO,CAAC,KAAK,CAAC,oDAAkD,SAAS,mCAAgC,CAAC,CAAC;wBAClH,MAAM,CAAC,OAAO,CAAC,KAAK,CAAC,iCAA+B,SAAS,cAAW,CAAC,CAAC;wBAC1E,OAAO,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,SAAS,CAAC;qBACnC;yBAAM,IAAI,GAAG,GAAG,SAAS,EAAE;wBACxB,MAAM,CAAC,OAAO,CAAC,IAAI,CAAC,oDAAkD,SAAS,cAAW,CAAC,CAAC;qBAC/F;iBACJ;;;;;;;;;QASE,4BAAM;;;;;;;;gBACT,IAAI,CAAC,eAAe,EAAE,CAAC;gBACvB,IAAI,CAAC,kBAAkB,EAAE,CAAC;;gBAG1B,IAAI,CAAC,eAAe,EAAE,CAAC;;;;;;;;;;QAWpB,2CAAqB;;;;;;;;sBAAC,QAAkB;gBAC3C,OAAO,IAAI,CAAC,eAAe,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;;;;;;;;;QAUxC,8CAAwB;;;;;;;sBAAC,EAAU;gBACtC,OAAO,OAAO,IAAI,CAAC,eAAe,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC;;;;;;;;;;QAWxC,4CAAsB;;;;;;;;sBAAC,QAAkB;gBAC5C,OAAO,IAAI,CAAC,gBAAgB,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;;;;;;;;;QAUzC,+CAAyB;;;;;;;sBAAC,EAAU;gBACvC,OAAO,OAAO,IAAI,CAAC,gBAAgB,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC;;;;;;;;;QAQxC,yCAAmB;;;;;;;sBAAC,QAAmB;;gBAC3C,QAAQ,CAAC,MAAM,CAAC,QAAQ,EAAE,SAAS,EAAE,UAAC,KAAmB;oBACrD,IAAI,CAAC,KAAI,CAAC,mBAAmB,CAAC,KAAK,CAAC,EAAE;wBAClC,OAAO;qBACV;oBACD,KAAI,CAAC,eAAe,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;oBACjC,KAAK,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;oBACrB,KAAI,CAAC,kBAAkB,EAAE,CAAC;;;oBAG1B,KAAI,CAAC,eAAe,EAAE,CAAC;iBAC1B,CAAC,CAAC;;;;;;;;;;;;;QAWC,oDAA8B;;;;;;;;;;;sBAAC,QAAmB;;gBACtD,QAAQ,CAAC,MAAM,CAAC,QAAQ,EAAE,SAAS,EAAE,UAAC,KAAmB;oBACrD,IAAI,KAAK,CAAC,GAAG,KAAK,KAAI,CAAC,YAAY,EAAE;wBACjC,KAAI,CAAC,kBAAkB,EAAE,CAAC;qBAC7B;iBACJ,CAAC,CAAC;;;;;;;;QAOC,yCAAmB;;;;;;sBAAC,KAAmB;gBAC3C,OAAO,KAAK,CAAC,MAAM,KAAK,IAAI,CAAC,OAAO,CAAC;;;;;QAGjC,wCAAkB;;;;;gBACtB,qBAAM,eAAe,GAAG,IAAI,CAAC,SAAS,EAAE,CAAC;gBAEzC,IAAI,IAAI,CAAC,UAAU,EAAE;oBACjB,MAAM,CAAC,YAAY,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;iBACxC;gBAED,IAAI,eAAe,EAAE;oBACjB,IAAI,CAAC,YAAY,CAAC,IAAI,CAAC;wBACnB,QAAQ,oBAAa,IAAI,CAAC,YAAY,EAAE,CAAA;wBACxC,QAAQ,oBAAa,IAAI,CAAC,YAAY,EAAE,CAAA;wBACxC,KAAK,oBAAa,IAAI,CAAC,SAAS,EAAE,CAAA;qBACrC,CAAC,CAAC;oBAEH,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,UAAA,QAAQ,IAAI,OAAA,QAAQ,IAAI,QAAQ,EAAE,GAAA,CAAC,CAAC;;oBAG7D,qBAAM,UAAU,IAAY,IAAI,CAAC,aAAa,CAAC,sBAAsB,EAAE,CAAA,CAAC;;oBAExE,qBAAM,KAAK,GAAG,CAAC,UAAU,GAAG,CAAC,IAAI,IAAI,EAAE,CAAC;oBACxC,IAAI,CAAC,UAAU,GAAG,MAAM,CAAC,UAAU,CAAC,cAAM,OAAA,KAAI,CAAC,MAAM,EAAE,GAAA,EAAE,KAAK,CAAC,CAAC;iBACnE;qBAAM;oBACH,IAAI,CAAC,eAAe,EAAE,CAAC;oBACvB,IAAI,CAAC,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;oBAC7B,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,UAAA,QAAQ,IAAI,OAAA,QAAQ,IAAI,QAAQ,EAAE,GAAA,CAAC,CAAC;iBACjE;;;;;;;QAQG,+BAAS;;;;;;gBACb,OAAO,IAAI,CAAC,aAAa,CAAC,YAAY,EAAE,CAAC;;;;;QAGrC,+BAAS;;;;gBACb,OAAO,IAAI,CAAC,aAAa,CAAC,QAAQ,EAAE,CAAC;;;;;QAGjC,kCAAY;;;;gBAChB,OAAO,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAmB,OAAO,EAAE,IAAI,CAAC,CAAC;;;;;QAGhE,kCAAY;;;;gBAChB,OAAO,IAAI,CAAC,aAAa,CAAC,QAAQ,CAAmB,MAAM,EAAE,IAAI,CAAC,CAAC;;;oBAlV1EJ,eAAU;;;;;wBA/BPK,qBAAgB;wBAkBhB,YAAY;wDAqCPC,WAAM,SAAC,UAAU;;;0BA1D1B;;;;;;;ACAA;QA0BI,oBAAoC,YAAwB;YACxD,IAAI,YAAY,EAAE;gBACd,MAAM,IAAI,KAAK,CAAC,8FAA8F,CAAC,CAAC;aACnH;SACJ;;;;;QAEM,kBAAO;;;;YAAd,UAAe,OAAoB;gBAC/B,OAAO;oBACH,QAAQ,EAAE,UAAU;oBACpB,SAAS,EAAE;wBACP,YAAY;wBACZ;4BACI,OAAO,EAAE,UAAU;4BACnB,QAAQ,EAAE,OAAO,GAAG,OAAO,GAAG,YAAY;yBAC7C;wBACD,WAAW;qBACd;iBACJ,CAAC;aACL;;oBArBJC,aAAQ,SAAC,EAAE;;;;;wBAG0C,UAAU,uBAA/CC,aAAQ,YAAIC,aAAQ;;;yBA1BrC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;"} |
@@ -1,2 +0,2 @@ | ||
!function(e,t){"object"==typeof exports&&"undefined"!=typeof module?t(exports,require("@angular/core"),require("@auth0/angular-jwt"),require("rxjs"),require("rxjs/operators")):"function"==typeof define&&define.amd?define("angular-aap-auth",["exports","@angular/core","@auth0/angular-jwt","rxjs","rxjs/operators"],t):t(e["angular-aap-auth"]={},e.ng.core,e.angularJwt,e.RxJS,e.Rx.Observable.prototype)}(this,function(e,t,n,i,o){"use strict";var r=function(){function e(e){this._jwt=e}return e.prototype.getToken=function(){return this._jwt.tokenGetter()},e.prototype.getTokenExpirationDate=function(){try{return this._jwt.getTokenExpirationDate()}catch(e){return null}},e.prototype.isTokenValid=function(){try{return!this._jwt.isTokenExpired()}catch(e){return!1}},e.prototype.getClaim=function(e,t){try{var n=this._jwt.decodeToken()[e];return n===undefined?t:n}catch(o){return t}},e}();r.decorators=[{type:t.Injectable}],r.ctorParameters=function(){return[{type:n.JwtHelperService}]};var a=new t.InjectionToken("AAP_CONFIG");function s(){return localStorage.getItem("id_token")||""}function u(){return localStorage.removeItem("id_token")}function l(e){return localStorage.setItem("id_token",e)}var c={aapURL:"https://api.aai.ebi.ac.uk",tokenGetter:s,tokenRemover:u,tokenUpdater:l},p=function(){function e(e,t,n){var o=this;this._rendererFactory=e,this._tokenService=t,this.config=n,this._credentials=new i.BehaviorSubject(null),this._loginCallbacks=[],this._logoutCallbacks=[],this._timeoutID=null,this._commKeyName="AngularAapAuthUpdated",this._commKeyUpdater=function(){return localStorage.setItem(o._commKeyName,""+(new Date).getTime())},this._domain=encodeURIComponent(window.location.origin),this._appURL=n.aapURL.replace(/\/$/,""),this._storageUpdater=n.tokenUpdater,n.tokenRemover?this._storageRemover=n.tokenRemover:this._storageRemover=function(){return n.tokenUpdater(null)};var r=this._rendererFactory.createRenderer(null,null);this._listenLoginMessage(r),this._listenChangesFromOtherWindows(r),this._updateCredentials()}return e.prototype.isAuthenticated=function(){return this._credentials.asObservable().pipe(o.map(function(e){return!!e}))},e.prototype.credentials=function(){return this._credentials.asObservable()},e.prototype.realname=function(){return this._credentials.asObservable().pipe(o.map(function(e){return e?e.realname:null}))},e.prototype.username=function(){return this._credentials.asObservable().pipe(o.map(function(e){return e?e.username:null}))},e.prototype.token=function(){return this._credentials.asObservable().pipe(o.map(function(e){return e?e.token:null}))},e.prototype.windowOpen=function(e,t,n,o,r){if(void 0===t&&(t=650),void 0===n&&(n=1e3),void 0===o&&(o=-1),void 0===r&&(r=-1),r<0){var i=screen.width;t<i&&(r=Math.round(i/2-t/2))}if(o<0){var a=screen.height;n<a&&(o=Math.round(a/2-n/2))}var s=["width="+t,"height="+n,"left="+r,"top="+o,"personalbar=no","toolbar=no","scrollbars=yes","resizable=yes","directories=no","location=no","menubar=no","titlebar=no","toolbar=no"],u=window.open(this.getSSOURL(e),"Sign in to Elixir",s.join(","));u&&u.focus()},e.prototype.tabOpen=function(e){var t=window.open(this.getSSOURL(e),"Sign in to Elixir");t&&t.focus()},e.prototype.getSSOURL=function(t){var e="";return t&&(this._filterLoginOptions(t),e=Object.keys(t).map(function(e){return[e,t[e]]}).reduce(function(e,t){return e+"&"+t[0]+"="+t[1]},"")),this._appURL+"/sso?from="+this._domain+e},e.prototype._filterLoginOptions=function(e){if(-1<Object.keys(e).indexOf("ttl")){var t=+e.ttl;1440<t?(window.console.error("Login requested with an expiration longer than 1440 minutes! This is not allowed."),window.console.error("Expiration request reset to 1440 minutes."),e.ttl="1440"):60<t&&window.console.warn("Login requested with an expiration longer than 60 minutes!")}},e.prototype.logOut=function(){this._storageRemover(),this._updateCredentials(),this._commKeyUpdater()},e.prototype.addLogInEventListener=function(e){return this._loginCallbacks.push(e)},e.prototype.removeLogInEventListener=function(e){return delete this._loginCallbacks[e-1]},e.prototype.addLogOutEventListener=function(e){return this._logoutCallbacks.push(e)},e.prototype.removeLogOutEventListener=function(e){return delete this._logoutCallbacks[e-1]},e.prototype._listenLoginMessage=function(e){var t=this;e.listen("window","message",function(e){t.messageIsAcceptable(e)&&(t._storageUpdater(e.data),e.source.close(),t._updateCredentials(),t._commKeyUpdater())})},e.prototype._listenChangesFromOtherWindows=function(e){var t=this;e.listen("window","storage",function(e){e.key===t._commKeyName&&t._updateCredentials()})},e.prototype.messageIsAcceptable=function(e){return e.origin===this._appURL},e.prototype._updateCredentials=function(){var e=this,t=this._loggedIn();if(this._timeoutID&&window.clearTimeout(this._timeoutID),t){this._credentials.next({realname:this._getRealName(),username:this._getUserName(),token:this._getToken()}),this._loginCallbacks.map(function(e){return e&&e()});var n=+this._tokenService.getTokenExpirationDate()-+new Date;this._timeoutID=window.setTimeout(function(){return e.logOut()},n)}else this._storageRemover(),this._credentials.next(null),this._logoutCallbacks.map(function(e){return e&&e()})},e.prototype._loggedIn=function(){return this._tokenService.isTokenValid()},e.prototype._getToken=function(){return this._tokenService.getToken()},e.prototype._getUserName=function(){return this._tokenService.getClaim("email",null)},e.prototype._getRealName=function(){return this._tokenService.getClaim("name",null)},e}();p.decorators=[{type:t.Injectable}],p.ctorParameters=function(){return[{type:t.RendererFactory2},{type:r},{type:undefined,decorators:[{type:t.Inject,args:[a]}]}]};var d=function(){function t(e){if(e)throw new Error("AuthModule is already loaded. It should only be imported in your application's main module.")}return t.forRoot=function(e){return{ngModule:t,providers:[r,{provide:a,useValue:e||c},p]}},t}();d.decorators=[{type:t.NgModule,args:[{}]}],d.ctorParameters=function(){return[{type:d,decorators:[{type:t.Optional},{type:t.SkipSelf}]}]},e.AuthModule=d,e.AuthService=p,e.TokenService=r,e.ɵb=a,e.ɵf=c,e.ɵc=s,e.ɵd=u,e.ɵe=l,Object.defineProperty(e,"__esModule",{value:!0})}); | ||
//# sourceMappingURL=angular-aap-auth.umd.min.js.map | ||
!function(e,t){"object"==typeof exports&&"undefined"!=typeof module?t(exports,require("@angular/core"),require("@auth0/angular-jwt"),require("rxjs"),require("rxjs/operators")):"function"==typeof define&&define.amd?define("angular-aap-auth",["exports","@angular/core","@auth0/angular-jwt","rxjs","rxjs/operators"],t):t(e["angular-aap-auth"]={},e.ng.core,e.angularJwt,e.RxJS,e.rxjs.operators)}(this,function(e,n,t,i,o){"use strict";var r=function(){function e(e){this._jwt=e}return e.prototype.getToken=function(){return this._jwt.tokenGetter()},e.prototype.getTokenExpirationDate=function(){try{return this._jwt.getTokenExpirationDate()}catch(e){return null}},e.prototype.isTokenValid=function(){try{return!this._jwt.isTokenExpired()}catch(e){return!1}},e.prototype.getClaim=function(e,t){try{var n=this._jwt.decodeToken()[e];return n===undefined?t:n}catch(o){return t}},e.decorators=[{type:n.Injectable}],e.ctorParameters=function(){return[{type:t.JwtHelperService}]},e}(),a=new n.InjectionToken("AAP_CONFIG");function s(){return localStorage.getItem("id_token")||""}function u(){return localStorage.removeItem("id_token")}function l(e){return localStorage.setItem("id_token",e)}var c={aapURL:"https://api.aai.ebi.ac.uk",tokenGetter:s,tokenRemover:u,tokenUpdater:l},p=function(){function e(e,t,n){var o=this;this._rendererFactory=e,this._tokenService=t,this.config=n,this._credentials=new i.BehaviorSubject(null),this._loginCallbacks=[],this._logoutCallbacks=[],this._timeoutID=null,this._commKeyName="AngularAapAuthUpdated",this._commKeyUpdater=function(){return localStorage.setItem(o._commKeyName,""+(new Date).getTime())},this._domain=encodeURIComponent(window.location.origin),this._appURL=n.aapURL.replace(/\/$/,""),this._storageUpdater=n.tokenUpdater,n.tokenRemover?this._storageRemover=n.tokenRemover:this._storageRemover=function(){return n.tokenUpdater(null)};var r=this._rendererFactory.createRenderer(null,null);this._listenLoginMessage(r),this._listenChangesFromOtherWindows(r),this._updateCredentials()}return e.prototype.isAuthenticated=function(){return this._credentials.asObservable().pipe(o.map(function(e){return!!e}))},e.prototype.credentials=function(){return this._credentials.asObservable()},e.prototype.realname=function(){return this._credentials.asObservable().pipe(o.map(function(e){return e?e.realname:null}))},e.prototype.username=function(){return this._credentials.asObservable().pipe(o.map(function(e){return e?e.username:null}))},e.prototype.token=function(){return this._credentials.asObservable().pipe(o.map(function(e){return e?e.token:null}))},e.prototype.windowOpen=function(e,t,n,o,r){if(void 0===t&&(t=650),void 0===n&&(n=1e3),void 0===o&&(o=-1),void 0===r&&(r=-1),r<0){var i=screen.width;t<i&&(r=Math.round(i/2-t/2))}if(o<0){var a=screen.height;n<a&&(o=Math.round(a/2-n/2))}var s=["width="+t,"height="+n,"left="+r,"top="+o,"personalbar=no","toolbar=no","scrollbars=yes","resizable=yes","directories=no","location=no","menubar=no","titlebar=no","toolbar=no"],u=window.open(this.getSSOURL(e),"Sign in to Elixir",s.join(","));u&&u.focus()},e.prototype.tabOpen=function(e){var t=window.open(this.getSSOURL(e),"Sign in to Elixir");t&&t.focus()},e.prototype.getSSOURL=function(t){var e="";return t&&(this._filterLoginOptions(t),e=Object.keys(t).map(function(e){return[e,t[e]]}).reduce(function(e,t){return e+"&"+t[0]+"="+t[1]},"")),this._appURL+"/sso?from="+this._domain+e},e.prototype._filterLoginOptions=function(e){if(-1<Object.keys(e).indexOf("ttl")){var t=+e.ttl;1440<t?(window.console.error("Login requested with an expiration longer than 1440 minutes! This is not allowed."),window.console.error("Expiration request reset to 1440 minutes."),e.ttl="1440"):60<t&&window.console.warn("Login requested with an expiration longer than 60 minutes!")}},e.prototype.logOut=function(){this._storageRemover(),this._updateCredentials(),this._commKeyUpdater()},e.prototype.addLogInEventListener=function(e){return this._loginCallbacks.push(e)},e.prototype.removeLogInEventListener=function(e){return delete this._loginCallbacks[e-1]},e.prototype.addLogOutEventListener=function(e){return this._logoutCallbacks.push(e)},e.prototype.removeLogOutEventListener=function(e){return delete this._logoutCallbacks[e-1]},e.prototype._listenLoginMessage=function(e){var t=this;e.listen("window","message",function(e){t.messageIsAcceptable(e)&&(t._storageUpdater(e.data),e.source.close(),t._updateCredentials(),t._commKeyUpdater())})},e.prototype._listenChangesFromOtherWindows=function(e){var t=this;e.listen("window","storage",function(e){e.key===t._commKeyName&&t._updateCredentials()})},e.prototype.messageIsAcceptable=function(e){return e.origin===this._appURL},e.prototype._updateCredentials=function(){var e=this,t=this._loggedIn();if(this._timeoutID&&window.clearTimeout(this._timeoutID),t){this._credentials.next({realname:this._getRealName(),username:this._getUserName(),token:this._getToken()}),this._loginCallbacks.map(function(e){return e&&e()});var n=+this._tokenService.getTokenExpirationDate()-+new Date;this._timeoutID=window.setTimeout(function(){return e.logOut()},n)}else this._storageRemover(),this._credentials.next(null),this._logoutCallbacks.map(function(e){return e&&e()})},e.prototype._loggedIn=function(){return this._tokenService.isTokenValid()},e.prototype._getToken=function(){return this._tokenService.getToken()},e.prototype._getUserName=function(){return this._tokenService.getClaim("email",null)},e.prototype._getRealName=function(){return this._tokenService.getClaim("name",null)},e.decorators=[{type:n.Injectable}],e.ctorParameters=function(){return[{type:n.RendererFactory2},{type:r},{type:undefined,decorators:[{type:n.Inject,args:[a]}]}]},e}(),d=function(){function t(e){if(e)throw new Error("AuthModule is already loaded. It should only be imported in your application's main module.")}return t.forRoot=function(e){return{ngModule:t,providers:[r,{provide:a,useValue:e||c},p]}},t.decorators=[{type:n.NgModule,args:[{}]}],t.ctorParameters=function(){return[{type:t,decorators:[{type:n.Optional},{type:n.SkipSelf}]}]},t}();e.AuthModule=d,e.AuthService=p,e.TokenService=r,e.ɵb=a,e.ɵf=c,e.ɵc=s,e.ɵd=u,e.ɵe=l,Object.defineProperty(e,"__esModule",{value:!0})}); | ||
//# sourceMappingURL=angular-aap-auth.umd.min.js.map |
/** | ||
* Copyright 2017 EMBL - European Bioinformatics Institute | ||
* | ||
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use | ||
* this file except in compliance with the License. You may obtain a copy of the | ||
* License at | ||
* | ||
* http://www.apache.org/licenses/LICENSE-2.0 | ||
* | ||
* Unless required by applicable law or agreed to in writing, software distributed | ||
* under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR | ||
* CONDITIONS OF ANY KIND, either express or implied. See the License for the | ||
* specific language governing permissions and limitations under the License. | ||
*/ | ||
import { Injectable, InjectionToken, Inject, RendererFactory2, NgModule, Optional, SkipSelf } from '@angular/core'; | ||
import { JwtHelperService } from '@auth0/angular-jwt'; | ||
import { BehaviorSubject } from 'rxjs'; | ||
import { map } from 'rxjs/operators'; | ||
/** | ||
* @fileoverview added by tsickle | ||
@@ -26,511 +6,7 @@ * @suppress {checkTypes} checked by tsc | ||
/** | ||
* The purpose of this very simple service is to interface between the | ||
* AuthService and the specific token manipulation routing of JwtHelperService. | ||
* In this way, if in the future we want to replace JwtHelperService by | ||
* another service, AuthService doesn't need to be modified, only this service. | ||
*/ | ||
class TokenService { | ||
/** | ||
* @param {?} _jwt | ||
*/ | ||
constructor(_jwt) { | ||
this._jwt = _jwt; | ||
} | ||
/** | ||
* @return {?} | ||
*/ | ||
getToken() { | ||
return this._jwt.tokenGetter(); | ||
} | ||
/** | ||
* @return {?} | ||
*/ | ||
getTokenExpirationDate() { | ||
try { | ||
return this._jwt.getTokenExpirationDate(); | ||
} | ||
catch (/** @type {?} */ e) { | ||
return null; | ||
} | ||
} | ||
/** | ||
* @return {?} | ||
*/ | ||
isTokenValid() { | ||
try { | ||
return !this._jwt.isTokenExpired(); | ||
} | ||
catch (/** @type {?} */ error) { | ||
return false; | ||
} | ||
} | ||
/** | ||
* Get claims from the token. | ||
* | ||
* @template T, C | ||
* @param {?} claim The name of the claim | ||
* @param {?} defaultValue The default value returned in case of error | ||
* | ||
* @return {?} claim or default value | ||
*/ | ||
getClaim(claim, defaultValue) { | ||
try { | ||
const /** @type {?} */ value = /** @type {?} */ (this._jwt.decodeToken()[claim]); | ||
if (value === undefined) { | ||
return defaultValue; | ||
} | ||
return value; | ||
} | ||
catch (/** @type {?} */ e) { | ||
return defaultValue; | ||
} | ||
} | ||
} | ||
TokenService.decorators = [ | ||
{ type: Injectable }, | ||
]; | ||
/** @nocollapse */ | ||
TokenService.ctorParameters = () => [ | ||
{ type: JwtHelperService, }, | ||
]; | ||
/** | ||
* @fileoverview added by tsickle | ||
* @suppress {checkTypes} checked by tsc | ||
*/ | ||
/** | ||
* @record | ||
*/ | ||
const AAP_CONFIG = new InjectionToken('AAP_CONFIG'); | ||
/** | ||
* @return {?} | ||
*/ | ||
function getToken() { | ||
return localStorage.getItem('id_token') || ''; | ||
} | ||
/** | ||
* @return {?} | ||
*/ | ||
function removeToken() { | ||
return localStorage.removeItem('id_token'); | ||
} | ||
/** | ||
* @param {?} newToken | ||
* @return {?} | ||
*/ | ||
function updateToken(newToken) { | ||
return localStorage.setItem('id_token', newToken); | ||
} | ||
const DEFAULT_CONF = { | ||
aapURL: 'https://api.aai.ebi.ac.uk', | ||
tokenGetter: getToken, | ||
tokenRemover: removeToken, | ||
tokenUpdater: updateToken | ||
}; | ||
/** | ||
* @fileoverview added by tsickle | ||
* @suppress {checkTypes} checked by tsc | ||
*/ | ||
/** | ||
* @record | ||
*/ | ||
/** | ||
* @record | ||
*/ | ||
class AuthService { | ||
/** | ||
* @param {?} _rendererFactory | ||
* @param {?} _tokenService | ||
* @param {?} config | ||
*/ | ||
constructor(_rendererFactory, _tokenService, config) { | ||
this._rendererFactory = _rendererFactory; | ||
this._tokenService = _tokenService; | ||
this.config = config; | ||
this._credentials = new BehaviorSubject(null); | ||
this._loginCallbacks = []; | ||
this._logoutCallbacks = []; | ||
this._timeoutID = null; | ||
this._commKeyName = 'AngularAapAuthUpdated'; | ||
this._commKeyUpdater = () => localStorage.setItem(this._commKeyName, '' + new Date().getTime()); | ||
this._domain = encodeURIComponent(window.location.origin); | ||
this._appURL = config.aapURL.replace(/\/$/, ''); | ||
this._storageUpdater = config.tokenUpdater; | ||
if (config.tokenRemover) { | ||
this._storageRemover = config.tokenRemover; | ||
} | ||
else { | ||
this._storageRemover = () => config.tokenUpdater(null); | ||
} | ||
const /** @type {?} */ renderer = this._rendererFactory.createRenderer(null, null); | ||
this._listenLoginMessage(renderer); | ||
this._listenChangesFromOtherWindows(renderer); | ||
this._updateCredentials(); // TODO: experiment with setTimeOut | ||
} | ||
/** | ||
* @return {?} | ||
*/ | ||
isAuthenticated() { | ||
return this._credentials.asObservable().pipe(map(credentials => credentials ? true : false)); | ||
} | ||
/** | ||
* @return {?} | ||
*/ | ||
credentials() { | ||
return this._credentials.asObservable(); | ||
} | ||
/** | ||
* @return {?} | ||
*/ | ||
realname() { | ||
return this._credentials.asObservable().pipe(map(credentials => credentials ? credentials.realname : null)); | ||
} | ||
/** | ||
* @return {?} | ||
*/ | ||
username() { | ||
return this._credentials.asObservable().pipe(map(credentials => credentials ? credentials.username : null)); | ||
} | ||
/** | ||
* @return {?} | ||
*/ | ||
token() { | ||
return this._credentials.asObservable().pipe(map(credentials => credentials ? credentials.token : null)); | ||
} | ||
/** | ||
* Functions that opens a window instead of a tab. | ||
* | ||
* See method _filterLoginOptions regarding security risks of certain | ||
* LoginOptions. | ||
* | ||
* @param {?=} loginOptions Options passed as URL parameters to the SSO. | ||
* @param {?=} width Pixel width of the login window. | ||
* @param {?=} height Pixel height of the login window. | ||
* @param {?=} top Position of the top corners. If it is a negative | ||
* number it centres the login window on the screen. | ||
* @param {?=} left Position of the left corners. If it is a negative | ||
* number it centres the login window on the screen. | ||
* @return {?} | ||
*/ | ||
windowOpen(loginOptions, width = 650, height = 1000, top = -1, left = -1) { | ||
if (left < 0) { | ||
const /** @type {?} */ screenWidth = screen.width; | ||
if (screenWidth > width) { | ||
left = Math.round(screenWidth / 2 - width / 2); | ||
} | ||
} | ||
if (top < 0) { | ||
const /** @type {?} */ screenHeight = screen.height; | ||
if (screenHeight > height) { | ||
top = Math.round(screenHeight / 2 - height / 2); | ||
} | ||
} | ||
const /** @type {?} */ windowOptions = [ | ||
`width=${width}`, | ||
`height=${height}`, | ||
`left=${left}`, | ||
`top=${top}`, | ||
'personalbar=no', | ||
'toolbar=no', | ||
'scrollbars=yes', | ||
'resizable=yes', | ||
'directories=no', | ||
'location=no', | ||
'menubar=no', | ||
'titlebar=no', | ||
'toolbar=no' | ||
]; | ||
const /** @type {?} */ loginWindow = window.open(this.getSSOURL(loginOptions), 'Sign in to Elixir', windowOptions.join(',')); | ||
if (loginWindow) { | ||
loginWindow.focus(); | ||
} | ||
} | ||
/** | ||
* Functions that opens a tab (in modern browser). | ||
* | ||
* See method _filterLoginOptions regarding security risks of certain | ||
* LoginOptions. | ||
* | ||
* @param {?=} loginOptions Options passed as URL parameters to the SSO. | ||
* @return {?} | ||
*/ | ||
tabOpen(loginOptions) { | ||
const /** @type {?} */ loginWindow = window.open(this.getSSOURL(loginOptions), 'Sign in to Elixir'); | ||
if (loginWindow) { | ||
loginWindow.focus(); | ||
} | ||
} | ||
/** | ||
* Produces a URL that allows logging into the single sign on (SSO) page. | ||
* The URL cans be opened in a new tab using target="_blank", | ||
* or in a new window using window.open(). | ||
* | ||
* See method _filterLoginOptions regarding security risks of certain | ||
* LoginOptions. | ||
* | ||
* @param {?=} options | ||
* @return {?} The SSO URL. | ||
* | ||
*/ | ||
getSSOURL(options) { | ||
let /** @type {?} */ extra = ''; | ||
if (options) { | ||
this._filterLoginOptions(options); | ||
extra = Object.keys(options) | ||
.map(key => [key, options[key]]) | ||
.reduce((accumulator, keyvalue) => `${accumulator}&${keyvalue[0]}=${keyvalue[1]}`, ''); | ||
} | ||
return `${this._appURL}/sso?from=${this._domain}${extra}`; | ||
} | ||
/** | ||
* Filters options that are unsecure. | ||
* | ||
* See the advance options that can be requested through the options parameter: | ||
* https://api.aai.ebi.ac.uk/docs/authentication/authentication.index.html#_common_attributes | ||
* | ||
* The time to live paramenter (ttl) default value is 60 minutes. It is a | ||
* big security risk to request longer ttl. If a third party gets hold of | ||
* such token, means that they could use it for a day, week, year | ||
* (essentially, like having the username/password). | ||
* | ||
* @param {?} options | ||
* @return {?} | ||
*/ | ||
_filterLoginOptions(options) { | ||
if (Object.keys(options).indexOf('ttl') > -1) { | ||
const /** @type {?} */ ttl = +options['ttl']; | ||
const /** @type {?} */ softLimit = 60; | ||
const /** @type {?} */ hardLimit = 60 * 24; | ||
if (ttl > hardLimit) { | ||
window.console.error(`Login requested with an expiration longer than ${hardLimit} minutes! This is not allowed.`); | ||
window.console.error(`Expiration request reset to ${hardLimit} minutes.`); | ||
options['ttl'] = '' + hardLimit; | ||
} | ||
else if (ttl > softLimit) { | ||
window.console.warn(`Login requested with an expiration longer than ${softLimit} minutes!`); | ||
} | ||
} | ||
} | ||
/** | ||
* Functions that logs out the user. | ||
* It triggers the logout callbacks. | ||
* It is an arrow function (lambda) because in that way it has a reference | ||
* to 'this' when used in setTimeout call. | ||
* @return {?} | ||
*/ | ||
logOut() { | ||
this._storageRemover(); | ||
this._updateCredentials(); | ||
// Triggers updating other windows | ||
this._commKeyUpdater(); | ||
} | ||
/** | ||
* Add a callback to the LogIn event. | ||
* | ||
* @param {?} callback The Function called when the login event is triggered and the | ||
* JWT token is received and accepted. | ||
* | ||
* @return {?} The event registration id (necessary to unregister the event). | ||
*/ | ||
addLogInEventListener(callback) { | ||
return this._loginCallbacks.push(callback); | ||
} | ||
/** | ||
* Remove a callback from the LogIn event. | ||
* | ||
* @param {?} id The id given when event listener was added. | ||
* | ||
* @return {?} true when remove successfully, false otherwise. | ||
*/ | ||
removeLogInEventListener(id) { | ||
return delete this._loginCallbacks[id - 1]; | ||
} | ||
/** | ||
* Add a callback to the LogOut event. | ||
* | ||
* @param {?} callback The Function called when the logout event is triggered and the | ||
* JWT token is received and accepted. | ||
* | ||
* @return {?} The registration id (necessary to unregister the event). | ||
*/ | ||
addLogOutEventListener(callback) { | ||
return this._logoutCallbacks.push(callback); | ||
} | ||
/** | ||
* Remove a callback from the LogOut event. | ||
* | ||
* @param {?} id The id given when event listener was added. | ||
* | ||
* @return {?} true when remove successfully, false otherwise. | ||
*/ | ||
removeLogOutEventListener(id) { | ||
return delete this._logoutCallbacks[id - 1]; | ||
} | ||
/** | ||
* Listen for login messages from other windows. | ||
* These messages contain the tokens from the AAP. | ||
* If a token is received then the callbacks are triggered. | ||
* @param {?} renderer | ||
* @return {?} | ||
*/ | ||
_listenLoginMessage(renderer) { | ||
renderer.listen('window', 'message', (event) => { | ||
if (!this.messageIsAcceptable(event)) { | ||
return; | ||
} | ||
this._storageUpdater(event.data); | ||
event.source.close(); | ||
this._updateCredentials(); | ||
// Triggers updating other windows | ||
this._commKeyUpdater(); | ||
}); | ||
} | ||
/** | ||
* Listen to changes in the token from *other* windows. | ||
* | ||
* For inter-window communication messages are transmitted trough changes | ||
* on a dummy storage key property: '_commKeyName'. | ||
* | ||
* Notice that changes in the '_commKeyName' produced by this class doesn't | ||
* trigger this event. | ||
* @param {?} renderer | ||
* @return {?} | ||
*/ | ||
_listenChangesFromOtherWindows(renderer) { | ||
renderer.listen('window', 'storage', (event) => { | ||
if (event.key === this._commKeyName) { | ||
this._updateCredentials(); | ||
} | ||
}); | ||
} | ||
/** | ||
* Check if the message is coming from the same domain we use to generate | ||
* the SSO URL, otherwise it's iffy and shouldn't trust it. | ||
* @param {?} event | ||
* @return {?} | ||
*/ | ||
messageIsAcceptable(event) { | ||
return event.origin === this._appURL; | ||
} | ||
/** | ||
* @return {?} | ||
*/ | ||
_updateCredentials() { | ||
const /** @type {?} */ isAuthenticated = this._loggedIn(); | ||
if (this._timeoutID) { | ||
window.clearTimeout(this._timeoutID); | ||
} | ||
if (isAuthenticated) { | ||
this._credentials.next({ | ||
realname: /** @type {?} */ (this._getRealName()), | ||
username: /** @type {?} */ (this._getUserName()), | ||
token: /** @type {?} */ (this._getToken()) | ||
}); | ||
this._loginCallbacks.map(callback => callback && callback()); | ||
// Schedule future logout event base on token expiration | ||
const /** @type {?} */ expireDate = /** @type {?} */ (this._tokenService.getTokenExpirationDate()); | ||
// Coercing dates to numbers with the unary operator '+' | ||
const /** @type {?} */ delay = +expireDate - +new Date(); | ||
this._timeoutID = window.setTimeout(() => this.logOut(), delay); | ||
} | ||
else { | ||
this._storageRemover(); // Cleanup possible left behind token | ||
this._credentials.next(null); | ||
this._logoutCallbacks.map(callback => callback && callback()); | ||
} | ||
} | ||
/** | ||
* Check if there's a user logging on and whether the token is still valid. | ||
* | ||
* @return {?} Whether the user user is authenticated or not. | ||
*/ | ||
_loggedIn() { | ||
return this._tokenService.isTokenValid(); | ||
} | ||
/** | ||
* @return {?} | ||
*/ | ||
_getToken() { | ||
return this._tokenService.getToken(); | ||
} | ||
/** | ||
* @return {?} | ||
*/ | ||
_getUserName() { | ||
return this._tokenService.getClaim('email', null); | ||
} | ||
/** | ||
* @return {?} | ||
*/ | ||
_getRealName() { | ||
return this._tokenService.getClaim('name', null); | ||
} | ||
} | ||
AuthService.decorators = [ | ||
{ type: Injectable }, | ||
]; | ||
/** @nocollapse */ | ||
AuthService.ctorParameters = () => [ | ||
{ type: RendererFactory2, }, | ||
{ type: TokenService, }, | ||
{ type: undefined, decorators: [{ type: Inject, args: [AAP_CONFIG,] },] }, | ||
]; | ||
/** | ||
* @fileoverview added by tsickle | ||
* @suppress {checkTypes} checked by tsc | ||
*/ | ||
class AuthModule { | ||
/** | ||
* @param {?} parentModule | ||
*/ | ||
constructor(parentModule) { | ||
if (parentModule) { | ||
throw new Error('AuthModule is already loaded. It should only be imported in your application\'s main module.'); | ||
} | ||
} | ||
/** | ||
* @param {?=} options | ||
* @return {?} | ||
*/ | ||
static forRoot(options) { | ||
return { | ||
ngModule: AuthModule, | ||
providers: [ | ||
TokenService, | ||
{ | ||
provide: AAP_CONFIG, | ||
useValue: options ? options : DEFAULT_CONF | ||
}, | ||
AuthService | ||
] | ||
}; | ||
} | ||
} | ||
AuthModule.decorators = [ | ||
{ type: NgModule, args: [{},] }, | ||
]; | ||
/** @nocollapse */ | ||
AuthModule.ctorParameters = () => [ | ||
{ type: AuthModule, decorators: [{ type: Optional }, { type: SkipSelf },] }, | ||
]; | ||
/** | ||
* @fileoverview added by tsickle | ||
* @suppress {checkTypes} checked by tsc | ||
*/ | ||
/** | ||
* @fileoverview added by tsickle | ||
* @suppress {checkTypes} checked by tsc | ||
*/ | ||
/** | ||
* Generated bundle index. Do not edit. | ||
*/ | ||
export { AuthModule, AuthService, TokenService } from './public_api'; | ||
export { AAP_CONFIG as ɵb, DEFAULT_CONF as ɵf, getToken as ɵc, removeToken as ɵd, updateToken as ɵe } from './app/modules/auth/auth.config'; | ||
export { AuthModule, AuthService, TokenService, AAP_CONFIG as ɵb, DEFAULT_CONF as ɵf, getToken as ɵc, removeToken as ɵd, updateToken as ɵe }; | ||
//# sourceMappingURL=angular-aap-auth.js.map | ||
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiYW5ndWxhci1hYXAtYXV0aC5qcyIsInNvdXJjZVJvb3QiOiJuZzovL2FuZ3VsYXItYWFwLWF1dGgvIiwic291cmNlcyI6WyJhbmd1bGFyLWFhcC1hdXRoLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7Ozs7QUFJQSxzREFBYyxjQUFjLENBQUM7QUFFN0IsT0FBTyxFQUFDLFVBQVUsSUFBSSxFQUFFLEVBQWtCLFlBQVksSUFBSSxFQUFFLEVBQUMsUUFBUSxJQUFJLEVBQUUsRUFBQyxXQUFXLElBQUksRUFBRSxFQUFDLFdBQVcsSUFBSSxFQUFFLEVBQUMsTUFBTSxnQ0FBZ0MsQ0FBQyIsInNvdXJjZXNDb250ZW50IjpbIi8qKlxuICogR2VuZXJhdGVkIGJ1bmRsZSBpbmRleC4gRG8gbm90IGVkaXQuXG4gKi9cblxuZXhwb3J0ICogZnJvbSAnLi9wdWJsaWNfYXBpJztcblxuZXhwb3J0IHtBQVBfQ09ORklHIGFzIMm1YixBdXRoQ29uZmlnIGFzIMm1YSxERUZBVUxUX0NPTkYgYXMgybVmLGdldFRva2VuIGFzIMm1YyxyZW1vdmVUb2tlbiBhcyDJtWQsdXBkYXRlVG9rZW4gYXMgybVlfSBmcm9tICcuL2FwcC9tb2R1bGVzL2F1dGgvYXV0aC5jb25maWcnOyJdfQ== |
@@ -1,288 +0,11 @@ | ||
import { Injectable, InjectionToken, Inject, RendererFactory2, NgModule, Optional, SkipSelf } from '@angular/core'; | ||
import { JwtHelperService } from '@auth0/angular-jwt'; | ||
import { BehaviorSubject } from 'rxjs'; | ||
import { map } from 'rxjs/operators'; | ||
/** | ||
* @fileoverview added by tsickle | ||
* @suppress {checkTypes} checked by tsc | ||
*/ | ||
/** | ||
* Generated bundle index. Do not edit. | ||
*/ | ||
export { AuthModule, AuthService, TokenService } from './public_api'; | ||
export { AAP_CONFIG as ɵb, DEFAULT_CONF as ɵf, getToken as ɵc, removeToken as ɵd, updateToken as ɵe } from './app/modules/auth/auth.config'; | ||
var TokenService = /** @class */ (function () { | ||
function TokenService(_jwt) { | ||
this._jwt = _jwt; | ||
} | ||
TokenService.prototype.getToken = function () { | ||
return this._jwt.tokenGetter(); | ||
}; | ||
TokenService.prototype.getTokenExpirationDate = function () { | ||
try { | ||
return this._jwt.getTokenExpirationDate(); | ||
} | ||
catch (e) { | ||
return null; | ||
} | ||
}; | ||
TokenService.prototype.isTokenValid = function () { | ||
try { | ||
return !this._jwt.isTokenExpired(); | ||
} | ||
catch (error) { | ||
return false; | ||
} | ||
}; | ||
TokenService.prototype.getClaim = function (claim, defaultValue) { | ||
try { | ||
var value = (this._jwt.decodeToken()[claim]); | ||
if (value === undefined) { | ||
return defaultValue; | ||
} | ||
return value; | ||
} | ||
catch (e) { | ||
return defaultValue; | ||
} | ||
}; | ||
return TokenService; | ||
}()); | ||
TokenService.decorators = [ | ||
{ type: Injectable }, | ||
]; | ||
TokenService.ctorParameters = function () { return [ | ||
{ type: JwtHelperService, }, | ||
]; }; | ||
var AAP_CONFIG = new InjectionToken('AAP_CONFIG'); | ||
function getToken() { | ||
return localStorage.getItem('id_token') || ''; | ||
} | ||
function removeToken() { | ||
return localStorage.removeItem('id_token'); | ||
} | ||
function updateToken(newToken) { | ||
return localStorage.setItem('id_token', newToken); | ||
} | ||
var DEFAULT_CONF = { | ||
aapURL: 'https://api.aai.ebi.ac.uk', | ||
tokenGetter: getToken, | ||
tokenRemover: removeToken, | ||
tokenUpdater: updateToken | ||
}; | ||
var AuthService = /** @class */ (function () { | ||
function AuthService(_rendererFactory, _tokenService, config) { | ||
var _this = this; | ||
this._rendererFactory = _rendererFactory; | ||
this._tokenService = _tokenService; | ||
this.config = config; | ||
this._credentials = new BehaviorSubject(null); | ||
this._loginCallbacks = []; | ||
this._logoutCallbacks = []; | ||
this._timeoutID = null; | ||
this._commKeyName = 'AngularAapAuthUpdated'; | ||
this._commKeyUpdater = function () { return localStorage.setItem(_this._commKeyName, '' + new Date().getTime()); }; | ||
this._domain = encodeURIComponent(window.location.origin); | ||
this._appURL = config.aapURL.replace(/\/$/, ''); | ||
this._storageUpdater = config.tokenUpdater; | ||
if (config.tokenRemover) { | ||
this._storageRemover = config.tokenRemover; | ||
} | ||
else { | ||
this._storageRemover = function () { return config.tokenUpdater(null); }; | ||
} | ||
var renderer = this._rendererFactory.createRenderer(null, null); | ||
this._listenLoginMessage(renderer); | ||
this._listenChangesFromOtherWindows(renderer); | ||
this._updateCredentials(); | ||
} | ||
AuthService.prototype.isAuthenticated = function () { | ||
return this._credentials.asObservable().pipe(map(function (credentials) { return credentials ? true : false; })); | ||
}; | ||
AuthService.prototype.credentials = function () { | ||
return this._credentials.asObservable(); | ||
}; | ||
AuthService.prototype.realname = function () { | ||
return this._credentials.asObservable().pipe(map(function (credentials) { return credentials ? credentials.realname : null; })); | ||
}; | ||
AuthService.prototype.username = function () { | ||
return this._credentials.asObservable().pipe(map(function (credentials) { return credentials ? credentials.username : null; })); | ||
}; | ||
AuthService.prototype.token = function () { | ||
return this._credentials.asObservable().pipe(map(function (credentials) { return credentials ? credentials.token : null; })); | ||
}; | ||
AuthService.prototype.windowOpen = function (loginOptions, width, height, top, left) { | ||
if (width === void 0) { width = 650; } | ||
if (height === void 0) { height = 1000; } | ||
if (top === void 0) { top = -1; } | ||
if (left === void 0) { left = -1; } | ||
if (left < 0) { | ||
var screenWidth = screen.width; | ||
if (screenWidth > width) { | ||
left = Math.round(screenWidth / 2 - width / 2); | ||
} | ||
} | ||
if (top < 0) { | ||
var screenHeight = screen.height; | ||
if (screenHeight > height) { | ||
top = Math.round(screenHeight / 2 - height / 2); | ||
} | ||
} | ||
var windowOptions = [ | ||
"width=" + width, | ||
"height=" + height, | ||
"left=" + left, | ||
"top=" + top, | ||
'personalbar=no', | ||
'toolbar=no', | ||
'scrollbars=yes', | ||
'resizable=yes', | ||
'directories=no', | ||
'location=no', | ||
'menubar=no', | ||
'titlebar=no', | ||
'toolbar=no' | ||
]; | ||
var loginWindow = window.open(this.getSSOURL(loginOptions), 'Sign in to Elixir', windowOptions.join(',')); | ||
if (loginWindow) { | ||
loginWindow.focus(); | ||
} | ||
}; | ||
AuthService.prototype.tabOpen = function (loginOptions) { | ||
var loginWindow = window.open(this.getSSOURL(loginOptions), 'Sign in to Elixir'); | ||
if (loginWindow) { | ||
loginWindow.focus(); | ||
} | ||
}; | ||
AuthService.prototype.getSSOURL = function (options) { | ||
var extra = ''; | ||
if (options) { | ||
this._filterLoginOptions(options); | ||
extra = Object.keys(options) | ||
.map(function (key) { return [key, options[key]]; }) | ||
.reduce(function (accumulator, keyvalue) { return accumulator + "&" + keyvalue[0] + "=" + keyvalue[1]; }, ''); | ||
} | ||
return this._appURL + "/sso?from=" + this._domain + extra; | ||
}; | ||
AuthService.prototype._filterLoginOptions = function (options) { | ||
if (Object.keys(options).indexOf('ttl') > -1) { | ||
var ttl = +options['ttl']; | ||
var softLimit = 60; | ||
var hardLimit = 60 * 24; | ||
if (ttl > hardLimit) { | ||
window.console.error("Login requested with an expiration longer than " + hardLimit + " minutes! This is not allowed."); | ||
window.console.error("Expiration request reset to " + hardLimit + " minutes."); | ||
options['ttl'] = '' + hardLimit; | ||
} | ||
else if (ttl > softLimit) { | ||
window.console.warn("Login requested with an expiration longer than " + softLimit + " minutes!"); | ||
} | ||
} | ||
}; | ||
AuthService.prototype.logOut = function () { | ||
this._storageRemover(); | ||
this._updateCredentials(); | ||
this._commKeyUpdater(); | ||
}; | ||
AuthService.prototype.addLogInEventListener = function (callback) { | ||
return this._loginCallbacks.push(callback); | ||
}; | ||
AuthService.prototype.removeLogInEventListener = function (id) { | ||
return delete this._loginCallbacks[id - 1]; | ||
}; | ||
AuthService.prototype.addLogOutEventListener = function (callback) { | ||
return this._logoutCallbacks.push(callback); | ||
}; | ||
AuthService.prototype.removeLogOutEventListener = function (id) { | ||
return delete this._logoutCallbacks[id - 1]; | ||
}; | ||
AuthService.prototype._listenLoginMessage = function (renderer) { | ||
var _this = this; | ||
renderer.listen('window', 'message', function (event) { | ||
if (!_this.messageIsAcceptable(event)) { | ||
return; | ||
} | ||
_this._storageUpdater(event.data); | ||
event.source.close(); | ||
_this._updateCredentials(); | ||
_this._commKeyUpdater(); | ||
}); | ||
}; | ||
AuthService.prototype._listenChangesFromOtherWindows = function (renderer) { | ||
var _this = this; | ||
renderer.listen('window', 'storage', function (event) { | ||
if (event.key === _this._commKeyName) { | ||
_this._updateCredentials(); | ||
} | ||
}); | ||
}; | ||
AuthService.prototype.messageIsAcceptable = function (event) { | ||
return event.origin === this._appURL; | ||
}; | ||
AuthService.prototype._updateCredentials = function () { | ||
var _this = this; | ||
var isAuthenticated = this._loggedIn(); | ||
if (this._timeoutID) { | ||
window.clearTimeout(this._timeoutID); | ||
} | ||
if (isAuthenticated) { | ||
this._credentials.next({ | ||
realname: (this._getRealName()), | ||
username: (this._getUserName()), | ||
token: (this._getToken()) | ||
}); | ||
this._loginCallbacks.map(function (callback) { return callback && callback(); }); | ||
var expireDate = (this._tokenService.getTokenExpirationDate()); | ||
var delay = +expireDate - +new Date(); | ||
this._timeoutID = window.setTimeout(function () { return _this.logOut(); }, delay); | ||
} | ||
else { | ||
this._storageRemover(); | ||
this._credentials.next(null); | ||
this._logoutCallbacks.map(function (callback) { return callback && callback(); }); | ||
} | ||
}; | ||
AuthService.prototype._loggedIn = function () { | ||
return this._tokenService.isTokenValid(); | ||
}; | ||
AuthService.prototype._getToken = function () { | ||
return this._tokenService.getToken(); | ||
}; | ||
AuthService.prototype._getUserName = function () { | ||
return this._tokenService.getClaim('email', null); | ||
}; | ||
AuthService.prototype._getRealName = function () { | ||
return this._tokenService.getClaim('name', null); | ||
}; | ||
return AuthService; | ||
}()); | ||
AuthService.decorators = [ | ||
{ type: Injectable }, | ||
]; | ||
AuthService.ctorParameters = function () { return [ | ||
{ type: RendererFactory2, }, | ||
{ type: TokenService, }, | ||
{ type: undefined, decorators: [{ type: Inject, args: [AAP_CONFIG,] },] }, | ||
]; }; | ||
var AuthModule = /** @class */ (function () { | ||
function AuthModule(parentModule) { | ||
if (parentModule) { | ||
throw new Error('AuthModule is already loaded. It should only be imported in your application\'s main module.'); | ||
} | ||
} | ||
AuthModule.forRoot = function (options) { | ||
return { | ||
ngModule: AuthModule, | ||
providers: [ | ||
TokenService, | ||
{ | ||
provide: AAP_CONFIG, | ||
useValue: options ? options : DEFAULT_CONF | ||
}, | ||
AuthService | ||
] | ||
}; | ||
}; | ||
return AuthModule; | ||
}()); | ||
AuthModule.decorators = [ | ||
{ type: NgModule, args: [{},] }, | ||
]; | ||
AuthModule.ctorParameters = function () { return [ | ||
{ type: AuthModule, decorators: [{ type: Optional }, { type: SkipSelf },] }, | ||
]; }; | ||
export { AuthModule, AuthService, TokenService, AAP_CONFIG as ɵb, DEFAULT_CONF as ɵf, getToken as ɵc, removeToken as ɵd, updateToken as ɵe }; | ||
//# sourceMappingURL=angular-aap-auth.js.map | ||
//# sourceMappingURL=data:application/json;base64,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 |
{ | ||
"name": "angular-aap-auth", | ||
"version": "1.0.0-alpha.10", | ||
"version": "1.0.0-alpha.11", | ||
"license": "Apache-2.0", | ||
@@ -31,30 +31,30 @@ "private": false, | ||
"devDependencies": { | ||
"@angular-devkit/build-angular": "~0.6.1", | ||
"@angular/cli": "6.0.1", | ||
"@angular/common": "6.0.2", | ||
"@angular/compiler": "6.0.2", | ||
"@angular/compiler-cli": "6.0.2", | ||
"@angular/core": "6.0.2", | ||
"@angular/language-service": "6.0.2", | ||
"@angular/platform-browser": "6.0.2", | ||
"@angular/platform-browser-dynamic": "6.0.2", | ||
"@angular-devkit/build-angular": "~0.6.8", | ||
"@angular/cli": "6.0.8", | ||
"@angular/common": "6.0.5", | ||
"@angular/compiler": "6.0.5", | ||
"@angular/compiler-cli": "6.0.5", | ||
"@angular/core": "6.0.5", | ||
"@angular/language-service": "6.0.5", | ||
"@angular/platform-browser": "6.0.5", | ||
"@angular/platform-browser-dynamic": "6.0.5", | ||
"@auth0/angular-jwt": "^2.0.0", | ||
"@types/jasmine": "~2.8.7", | ||
"@types/jasmine": "~2.8.8", | ||
"@types/jasminewd2": "~2.0.3", | ||
"@types/node": "~10.1.0", | ||
"@types/node": "~10.3.4", | ||
"codelyzer": "^4.3.0", | ||
"core-js": "^2.5.6", | ||
"core-js": "^2.5.7", | ||
"jasmine-core": "^3.1.0", | ||
"jasmine-spec-reporter": "~4.2.1", | ||
"karma": "~2.0.2", | ||
"karma": "~2.0.3", | ||
"karma-chrome-launcher": "~2.2.0", | ||
"karma-coverage-istanbul-reporter": "^1.4.2", | ||
"karma-coverage-istanbul-reporter": "^2.0.1", | ||
"karma-jasmine": "~1.1.2", | ||
"karma-jasmine-html-reporter": "^1.1.0", | ||
"ng-packagr": "^2.4.4", | ||
"ng-packagr": "^3.0.3", | ||
"npm-check-updates": "^2.14.2", | ||
"protractor": "~5.3.2", | ||
"rxjs": "^6.1.0", | ||
"rxjs-tslint-rules": "^4.2.0", | ||
"ts-node": "~6.0.3", | ||
"rxjs": "^6.2.1", | ||
"rxjs-tslint-rules": "^4.4.2", | ||
"ts-node": "~6.1.1", | ||
"tslint": "~5.10.0", | ||
@@ -66,6 +66,11 @@ "typedoc": "^0.11.1", | ||
"main": "bundles/angular-aap-auth.umd.js", | ||
"module": "esm5/angular-aap-auth.js", | ||
"es2015": "esm2015/angular-aap-auth.js", | ||
"module": "fesm5/angular-aap-auth.js", | ||
"es2015": "fesm2015/angular-aap-auth.js", | ||
"esm5": "esm5/angular-aap-auth.js", | ||
"esm2015": "esm2015/angular-aap-auth.js", | ||
"fesm5": "fesm5/angular-aap-auth.js", | ||
"fesm2015": "fesm2015/angular-aap-auth.js", | ||
"typings": "angular-aap-auth.d.ts", | ||
"metadata": "angular-aap-auth.metadata.json" | ||
"metadata": "angular-aap-auth.metadata.json", | ||
"sideEffects": false | ||
} |
@@ -40,8 +40,12 @@ # angular-aap-auth | ||
import { | ||
AppComponent | ||
} from './app.component'; | ||
import { | ||
AuthModule | ||
} from 'angular-aap-auth'; | ||
import { | ||
JwtModule | ||
} from '@auth0/angular-jwt'; | ||
import { | ||
AppComponent | ||
} from './app.component'; | ||
@NgModule({ | ||
@@ -53,6 +57,6 @@ declarations: [ | ||
BrowserModule, | ||
AuthModule.forRoot(), | ||
JwtModuld.forRoot({ | ||
AuthModule.forRoot(), // Defaults to localStorage `id_token` key. | ||
JwtModule.forRoot({ | ||
config: { | ||
tokenGetter: () => localStorage.getItem( 'id_token') | ||
tokenGetter: () => localStorage.getItem('id_token') | ||
} | ||
@@ -79,3 +83,3 @@ }) | ||
Observable, | ||
} from 'rxjs/Observable'; | ||
} from 'rxjs'; | ||
@@ -130,3 +134,3 @@ import { | ||
Observable, | ||
} from 'rxjs/Observable'; | ||
} from 'rxjs'; | ||
import { | ||
@@ -197,2 +201,5 @@ map | ||
} from 'angular-aap-auth'; | ||
import { | ||
JwtModule | ||
} from '@auth0/angular-jwt'; | ||
@@ -222,3 +229,3 @@ export function getToken(): string { | ||
}), | ||
JwtModuld.forRoot({ | ||
JwtModule.forRoot({ | ||
config: { | ||
@@ -244,3 +251,3 @@ tokenGetter: getToken, | ||
Observable, | ||
} from 'rxjs/Observable'; | ||
} from 'Observable'; | ||
import { | ||
@@ -247,0 +254,0 @@ map |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
Major refactor
Supply chain riskPackage has recently undergone a major refactor. It may be unstable or indicate significant internal changes. Use caution when updating to versions that include significant changes.
Found 1 instance in 1 package
License Policy Violation
LicenseThis package is not allowed per your license policy. Review the package's license to ensure compliance.
Found 1 instance in 1 package
402875
31
3410
335
1