diff --git a/WebServer/bin/code/Resources.class b/WebServer/bin/code/Resources.class index d77a40ed352a05187daa44f6f233c2d0156c02fe..ff670eb776da0489f96d95e76f6dfdefcd67c103 100644 Binary files a/WebServer/bin/code/Resources.class and b/WebServer/bin/code/Resources.class differ diff --git a/WebServer/bin/code/Server.class b/WebServer/bin/code/Server.class index 9a5bb2dca954bb0b713a13fab23299c0e70e94dc..ba08391345eca2b494140003a57e34b886273b5b 100644 Binary files a/WebServer/bin/code/Server.class and b/WebServer/bin/code/Server.class differ diff --git a/WebServer/src/code/Resources.java b/WebServer/src/code/Resources.java index 85ee6c406a7c0958d428b5a7e4bfaf0b5a61748f..c2029e38a34e4be0c46558b757c91813a8574739 100644 --- a/WebServer/src/code/Resources.java +++ b/WebServer/src/code/Resources.java @@ -39,7 +39,7 @@ public class Resources implements HttpHandler { case "js/" : strlist.add("text/javascript"); break; case "css" : strlist.add("text/css"); break; // case "con" : strlist.add("text/plain"); break; - case "con" : strlist.add("application/json"); break; + // case "con" : strlist.add("application/json"); break; // default : strlist.add("text/plain"); break; default: strlist.add("text"); break; } diff --git a/WebServer/src/code/Server.java b/WebServer/src/code/Server.java index 7a484be35574d06781b52f62dbf58f2a6e607be3..651a807871efbd2a9502417c6b2e601baf4ff760 100644 --- a/WebServer/src/code/Server.java +++ b/WebServer/src/code/Server.java @@ -87,7 +87,7 @@ public class Server { server.createContext("/js/authentication/",new Resources()); server.createContext("/js/templates/",new Resources()); server.createContext("/css/",new Resources()); - server.createContext("/conf/",new Resources()); + // server.createContext("/conf/",new Resources()); server.createContext("/res/",new ImageRes()); server.createContext("/secured/home/js/",new Resources()); server.createContext("/secured/home/css/",new Resources()); diff --git a/keycloak-19.0.1/data/h2/keycloakdb.lock.db b/keycloak-19.0.1/data/h2/keycloakdb.lock.db index 06e320ab9f06a821d0b4b7dc692799b4326b7463..f3a4d95528415e51bf1fcc3cf6e6434c9f7a367d 100644 --- a/keycloak-19.0.1/data/h2/keycloakdb.lock.db +++ b/keycloak-19.0.1/data/h2/keycloakdb.lock.db @@ -1,6 +1,6 @@ #FileLock -#Wed Sep 14 16:24:41 CEST 2022 -server=localhost\:44755 +#Wed Sep 14 17:26:24 CEST 2022 hostName=localhost +id=1833c959d82a7836ed0e7315f92a10aced4476cbd47 method=file -id=1833c633e7d2ba3b048a044a44b09843d1248f762d0 +server=localhost\:56546 diff --git a/webapp/public/conf/conf.json b/webapp/public/conf/conf.json deleted file mode 100644 index e69de29bb2d1d6434b8b29ae775ad8c2e48c5391..0000000000000000000000000000000000000000 diff --git a/webapp/public/js/authentication/configuration.js b/webapp/public/js/authentication/configuration.js index 311a976968c56dc26db7f0a4854eebebb9a0bf33..38503a6423e349cfad1a95206a7ca9ac49d1dd40 100644 --- a/webapp/public/js/authentication/configuration.js +++ b/webapp/public/js/authentication/configuration.js @@ -1,6 +1,5 @@ "use strict"; -// import conf from '../../conf/conf.json' assert {type: 'json'}; const conf = { "self-server-url": "https://localhost:3000/", "keycloak": { @@ -12,26 +11,24 @@ const conf = { } }; -class Configuration { - static getMyURL() { - return conf["self-server-url"]; - } +function getMyURL() { + return conf["self-server-url"]; +} - static getKeycloakInfo() { - return conf.keycloak; - } +function getKeycloakInfo() { + return conf.keycloak; +} - static getKeycloakRealm() { - return conf.keycloak.realm; - } +function getKeycloakRealm() { + return conf.keycloak.realm; +} - static getKeycloakURL() { - return conf.keycloak["base-server-url"]; - } +function getKeycloakURL() { + return conf.keycloak["base-server-url"]; +} - static getDomainURL() { - return conf.domain["base-domain-url"]; - } +function getDomainURL() { + return conf.domain["base-domain-url"]; } -export default Configuration; \ No newline at end of file +export {getMyURL, getKeycloakInfo, getKeycloakRealm, getKeycloakURL, getDomainURL}; \ No newline at end of file diff --git a/webapp/public/js/authentication/requests-to-domain.js b/webapp/public/js/authentication/requests-to-domain.js index 6c83e31d116dca78a64832ad9f4e3c354e34211c..ed7d3804f9d6df4ffee5f4687a4b34438e9829e6 100644 --- a/webapp/public/js/authentication/requests-to-domain.js +++ b/webapp/public/js/authentication/requests-to-domain.js @@ -2,8 +2,7 @@ import {getToken} from "./script.js"; import Domain from "./domain.js"; -import Configuration from "./configuration.js"; -const configuration = new Configuration(); +import { getDomainURL } from './configuration.js'; class RequestToDomain { @@ -16,7 +15,7 @@ class RequestToDomain { * sui domini dell'utente che ha effettuato il login */ static async getMyDomains() { - const responseDomain = await fetch(`${configuration.getDomainURL()}secured/domains/`, { // DA FARE: controllare che l'uri che ho specificato qui coincida con quello specificato dal domain manager + const responseDomain = await fetch(`${getDomainURL()}secured/domains/`, { // DA FARE: controllare che l'uri che ho specificato qui coincida con quello specificato dal domain manager method: 'GET', headers: { 'Authorization': `Bearer ${await getToken()}` @@ -42,7 +41,7 @@ class RequestToDomain { * false altrimenti. */ static async createNewDomain(json) { - const response = await fetch(`${configuration.getDomainURL()}install/`, { + const response = await fetch(`${getDomainURL()}install/`, { method: 'POST', headers: { 'Authorization': `Bearer ${await getToken()}` @@ -63,7 +62,7 @@ class RequestToDomain { * disponibili. */ static async getAllServices() { - const responseDomain = await fetch(`${configuration.getDomainURL()}secured/services`, { // DA FARE: controllare che l'uri che ho specificato qui coincida con quello specificato dal domain manager + const responseDomain = await fetch(`${getDomainURL()}secured/services`, { // DA FARE: controllare che l'uri che ho specificato qui coincida con quello specificato dal domain manager method: 'GET', headers: { 'Authorization': `Bearer ${await getToken()}` @@ -84,7 +83,7 @@ class RequestToDomain { * @returns */ static async getUsedServices(domain) { - const response = await fetch(`${configuration.getDomainURL()}secured/services?domain=${domain}`, { + const response = await fetch(`${getDomainURL()}secured/services?domain=${domain}`, { method: 'GET', headers: { 'Authorization': `Bearer ${await getToken()}` @@ -105,7 +104,7 @@ class RequestToDomain { * false altrimenti. */ static async startDomain(d) { - const response = await fetch(`${configuration.getDomainURL()}start/`, { + const response = await fetch(`${getDomainURL()}start/`, { method: 'POST', headers: { 'Authorization': `Bearer ${await getToken()}` @@ -128,7 +127,7 @@ class RequestToDomain { * false altrimenti. */ static async stopDomain(d) { - const response = await fetch(`${configuration.getDomainURL()}stop/`, { + const response = await fetch(`${getDomainURL()}stop/`, { method: 'POST', headers: { 'Authorization': `Bearer ${await getToken()}` @@ -151,7 +150,7 @@ class RequestToDomain { * false altrimenti. */ static async deleteDomain(d) { - const response = await fetch(`${configuration.getDomainURL()}delete/`, { + const response = await fetch(`${getDomainURL()}delete/`, { method: 'POST', headers: { 'Authorization': `Bearer ${await getToken()}` @@ -171,7 +170,7 @@ class RequestToDomain { * @returns */ static async getUserPriviledges(domain) { - const response = await fetch(`${configuration.getDomainURL()}secured/priviledges?domain=${domain}`, { + const response = await fetch(`${getDomainURL()}secured/priviledges?domain=${domain}`, { method: 'GET', headers: { 'Authorization': `Bearer ${await getToken()}` diff --git a/webapp/public/js/authentication/script.js b/webapp/public/js/authentication/script.js index 169cb371c5c59d2ec2239ed65acf6c0be2f9fa55..a32f0047b4c634206c7c085257e4b2100e5858d4 100644 --- a/webapp/public/js/authentication/script.js +++ b/webapp/public/js/authentication/script.js @@ -4,8 +4,8 @@ import App from './app.js'; import RequestToDomain from './requests-to-domain.js'; // import * as jose from 'jose'; // per la gestione del token -import Configuration from './configuration.js'; -const configuration = new Configuration(); +import { getKeycloakRealm, getKeycloakURL, getMyURL } from './configuration.js'; + const mySecure = new Secure(); @@ -51,7 +51,7 @@ else if(uri.includes("#")){ // {nome: "casa4", stato:"on", admin: false} // ]; - const app = new App(myDomains,configuration); + const app = new App(myDomains); } } } else if(uri.includes(`/secured/home/`)) { @@ -77,7 +77,7 @@ function queryStringGetValue(queryString) { */ async function requestFirstToken(uriAuthCode) { - const url = `${configuration.getKeycloakURL()}realms/${configuration.getKeycloakRealm()}/protocol/openid-connect/token`; + const url = `${getKeycloakURL()}realms/${getKeycloakRealm()}/protocol/openid-connect/token`; const response = await fetch(url, { method: `POST`, headers: { @@ -88,7 +88,7 @@ async function requestFirstToken(uriAuthCode) { client_id: `myclient`, code_verifier: sessionStorage.getItem("codeVerifier"), code: uriAuthCode, - redirect_uri: `${configuration.getMyURL()}secured` + redirect_uri: `${getMyURL()}secured` }) }); token = await response.json(); @@ -115,7 +115,7 @@ async function getToken() { * Post per la richiesta del token usando il refresh token. */ async function requestUsingRefreshToken() { - const url = `${configuration.getKeycloakURL()}realms/${configuration.getKeycloakRealm()}/protocol/openid-connect/token`; + const url = `${getKeycloakURL()}realms/${getKeycloakRealm()}/protocol/openid-connect/token`; const response = await fetch(url, { method: `POST`, headers: { @@ -165,7 +165,7 @@ async function logoutKeycloak() { if(token == null) return; clearTimeout(oldTimeout); // DA FARE: funziona, ma vedere se fare il redirect alla pagina iniziale. - window.location.href = `${configuration.getKeycloakURL()}realms/${configuration.getKeycloakRealm()}/protocol/openid-connect/logout?id_token_hint=${await getIdToken()}`; + window.location.href = `${getKeycloakURL()}realms/${getKeycloakRealm()}/protocol/openid-connect/logout?id_token_hint=${await getIdToken()}`; }