1
0
Fork 0
mirror of https://github.com/openstf/stf synced 2025-10-04 10:19:30 +02:00

remove unnecessary options from api unit. Improve error messages... etc etc

This commit is contained in:
Vishal Banthia 2015-12-04 16:42:11 +09:00
parent 221bc78e49
commit 536e469e6f
5 changed files with 21 additions and 29 deletions

View file

@ -871,22 +871,15 @@ program
, 'secret (or $SECRET)' , 'secret (or $SECRET)'
, String , String
, process.env.SECRET) , process.env.SECRET)
.option('-a, --auth-url <url>'
, 'URL to auth client'
, String)
.action(function(options) { .action(function(options) {
if (!options.secret) { if (!options.secret) {
this.missingArgument('--secret') this.missingArgument('--secret')
} }
if (!options.authUrl) {
this.missingArgument('--auth-url')
}
require('./units/api')({ require('./units/api')({
port: options.port port: options.port
, ssid: options.ssid , ssid: options.ssid
, secret: options.secret , secret: options.secret
, authUrl: options.authUrl
}) })
}) })
@ -1335,12 +1328,6 @@ program
'api' 'api'
, '--port', options.apiPort , '--port', options.apiPort
, '--secret', options.authSecret , '--secret', options.authSecret
, '--auth-url', options.authUrl || util.format(
'http://%s:%d/auth/%s/'
, options.publicIp
, options.poorxyPort
, ({oauth2: 'oauth'}[options.authType]) || options.authType
)
]) ])
// websocket // websocket
, procutil.fork(__filename, [ , procutil.fork(__filename, [

View file

@ -4,12 +4,12 @@ var dbapi = require('../../../db/api')
var logger = require('../../../util/logger') var logger = require('../../../util/logger')
var datautil = require('../../../util/datautil') var datautil = require('../../../util/datautil')
var log = logger.createLogger('api:contoller:device') var log = logger.createLogger('api:controllers:device')
module.exports = { module.exports = {
getDevices: getDevices getDevices: getDevices
, getDeviceBySerial: getDeviceBySerial , getDeviceBySerial: getDeviceBySerial
}; }
function getDevices(req, res) { function getDevices(req, res) {
dbapi.loadDevices() dbapi.loadDevices()

View file

@ -3,11 +3,11 @@ var Promise = require('bluebird')
var dbapi = require('../../../db/api') var dbapi = require('../../../db/api')
var logger = require('../../../util/logger') var logger = require('../../../util/logger')
var log = logger.createLogger('api:contoller:token') var log = logger.createLogger('api:controllers:token')
module.exports = { module.exports = {
getAccessTokens: getAccessTokens getAccessTokens: getAccessTokens
}; }
function getAccessTokens(req, res) { function getAccessTokens(req, res) {
dbapi.loadAccessTokens(req.user.email) dbapi.loadAccessTokens(req.user.email)

View file

@ -4,12 +4,12 @@ var dbapi = require('../../../db/api')
var logger = require('../../../util/logger') var logger = require('../../../util/logger')
var datautil = require('../../../util/datautil') var datautil = require('../../../util/datautil')
var log = logger.createLogger('api:contoller:user') var log = logger.createLogger('api:controllers:user')
module.exports = { module.exports = {
getCurrentUser: getCurrentUser getCurrentUser: getCurrentUser
, getCurrentUserGroup: getCurrentUserGroup , getCurrentUserGroup: getCurrentUserGroup
}; }
function getCurrentUser(req, res) { function getCurrentUser(req, res) {
res.json({ res.json({

View file

@ -3,7 +3,7 @@ var urlutil = require('../../../util/urlutil')
var logger = require('../../../util/logger') var logger = require('../../../util/logger')
var dbapi = require('../../../db/api') var dbapi = require('../../../db/api')
var log = logger.createLogger('api:auth') var log = logger.createLogger('api:helpers:securityHandlers')
module.exports = { module.exports = {
accessTokenAuth: accessTokenAuth accessTokenAuth: accessTokenAuth
@ -27,24 +27,30 @@ function accessTokenAuth(req, res, next) {
next() next()
} }
}) })
} else {
res.json(500, {
success: false
})
} }
}) })
.catch(function(err) { .catch(function(err) {
log.error('Failed to load token: ', err.stack) log.error('Failed to load token: ', err.stack)
res.json(500, { res.json(401, {
success: false, success: false,
description: "Bad Access Token" description: 'Bad credentials'
}) })
}) })
} else { } else {
log.error("Bad Access Token Header") log.error('Bad Access Token Header')
res.json(500, { res.json(401, {
success: false, success: false,
description: "Bad Access Token Header" description: 'Bad credentials'
}) })
} }
} }
// Request is coming from browser app
// TODO: Remove this once frontend become stateless // TODO: Remove this once frontend become stateless
// and start sending request without session
else if (req.session && req.session.jwt) { else if (req.session && req.session.jwt) {
dbapi.loadUser(req.session.jwt.email) dbapi.loadUser(req.session.jwt.email)
.then(function(user) { .then(function(user) {
@ -54,17 +60,16 @@ function accessTokenAuth(req, res, next) {
} }
else { else {
res.json(500, { res.json(500, {
success: false, success: false
description: "Bad Request"
}) })
} }
}) })
.catch(next) .catch(next)
} }
else { else {
res.json(500, { res.json(401, {
success: false, success: false,
description: "Request does not have Authorization header" description: 'Requires authentication'
}) })
} }
} }