Compare commits

...

4 Commits

Author SHA1 Message Date
Javier Segarra 5601ce5dac refs #6264 fix: rename variable
gitea/salix/pipeline/head This commit looks good Details
2023-11-04 17:25:30 +01:00
Javier Segarra 43366d1ba8 refs #6264 feat: update fixture.sql 2023-11-04 17:24:04 +01:00
Javier Segarra 21028e3b79 refs #6264 feat: db changes 2023-11-04 17:23:44 +01:00
Javier Segarra 67faf076d2 refs '#6264' feat: memoization accessTokenConfig 2023-11-04 16:51:25 +01:00
7 changed files with 30 additions and 15 deletions

View File

@ -1,5 +1,8 @@
const tokenConfig = require('./token-config');
module.exports = async token => {
const accessTokenConfig = await tokenConfig();
module.exports = async(token, accessTokenConfig) => {
const now = new Date();
const differenceMilliseconds = now - token.created;
const differenceSeconds = Math.floor(differenceMilliseconds / 1000);

View File

@ -1,5 +1,7 @@
const UserError = require('vn-loopback/util/user-error');
const handlePromiseLogout = (Self, {id}, courtesyTime = 60) => {
const tokenConfig = require('./token-config');
const DEFAULT_COURTESY_TIME = 60;
const handlePromiseLogout = (Self, {id}, courtesyTime = DEFAULT_COURTESY_TIME) => {
new Promise(res => {
setTimeout(() => {
res(Self.logout(id));
@ -23,14 +25,13 @@ module.exports = Self => {
});
Self.renewToken = async function(ctx) {
const models = Self.app.models;
const token = ctx.req.accessToken;
const {accessToken: token} = ctx.req;
// Check if current token is valid
const isValid = await Self.validateToken(token);
if (!isValid) throw new UserError(`The renew period has not been exceeded`, 'periodNotExceeded');
const fields = ['courtesyTime'];
const {courtesyTime} = await models.AccessTokenConfig.findOne({fields});
const {courtesyTime} = await tokenConfig();
// Schedule to remove current token
handlePromiseLogout(Self, token, courtesyTime);

View File

@ -0,0 +1,9 @@
const DEFAULT_FIELDS = ['renewPeriod', 'courtesyTime'];
const {models} = require('vn-loopback/server/server');
let currentAccessTokenConfig = null;
module.exports = async(fields = DEFAULT_FIELDS) => {
if (currentAccessTokenConfig) return currentAccessTokenConfig;
const accessTokenConfig = await models.AccessTokenConfig.findOne({fields});
if (!accessTokenConfig) currentAccessTokenConfig = accessTokenConfig;
return accessTokenConfig;
};

View File

@ -14,9 +14,7 @@ module.exports = Self => {
});
Self.validateToken = async function(token) {
const fields = ['renewPeriod', 'courtesyTime'];
const accessTokenConfig = await Self.app.models.AccessTokenConfig.findOne({fields});
const isValid = await isTokenValid(token, accessTokenConfig);
const isValid = await isTokenValid(token);
return isValid;
};
};

View File

@ -0,0 +1,4 @@
-- Auto-generated SQL script #202311061003
UPDATE salix.accessTokenConfig
SET courtesyTime=60
WHERE id=1;

View File

@ -2945,9 +2945,9 @@ INSERT INTO `vn`.`wagonTypeTray` (`id`, `typeFk`, `height`, `colorFk`)
(2, 1, 50, 2),
(3, 1, 0, 3);
INSERT INTO `salix`.`accessTokenConfig` (`id`, `renewPeriod`, `renewInterval`)
INSERT INTO `salix`.`accessTokenConfig` (`id`, `renewPeriod`, `courtesyTime`, `renewInterval`)
VALUES
(1, 21600, 300);
(1, 21600, 60, 300);
INSERT INTO `vn`.`travelConfig` (`id`, `warehouseInFk`, `warehouseOutFk`, `agencyFk`, `companyFk`)
VALUES

View File

@ -82,7 +82,7 @@ export default class Token {
if (!data) return;
this.renewPeriod = data.renewPeriod;
this.stopRenewer();
this.inservalId = setInterval(() => this.checkValidity(), data.renewInterval * 1000);
this.intervalId = setInterval(() => this.checkValidity(), data.renewInterval * 1000);
});
}
@ -113,7 +113,7 @@ export default class Token {
}
stopRenewer() {
clearInterval(this.inservalId);
clearInterval(this.intervalId);
}
}
Token.$inject = ['vnInterceptor', '$http', '$rootScope'];