|
@@ -3,6 +3,28 @@ import axios from "axios";
|
|
|
import router from "../router";
|
|
|
import { loadProgressBar } from "axios-progress-bar";
|
|
|
import networkInformationHint from "./networkInformationHint.js";
|
|
|
+import { initSyncTime, fetchTime } from "./syncServerTime";
|
|
|
+import { getAuthorization } from "./crypto";
|
|
|
+function setAuth(config) {
|
|
|
+ let userSession = sessionStorage.getItem("user");
|
|
|
+ console.log("userSession", userSession);
|
|
|
+ if (userSession && !config.noAuth) {
|
|
|
+ let user = JSON.parse(userSession);
|
|
|
+ const timestamp = fetchTime();
|
|
|
+ const authorization = getAuthorization(
|
|
|
+ {
|
|
|
+ method: config.method,
|
|
|
+ uri: config.url.split("?")[0].trim(),
|
|
|
+ timestamp,
|
|
|
+ sessionId: user.sessionId,
|
|
|
+ token: user.accessToken,
|
|
|
+ },
|
|
|
+ "token"
|
|
|
+ );
|
|
|
+ config.headers["Authorization"] = authorization;
|
|
|
+ config.headers["time"] = timestamp;
|
|
|
+ }
|
|
|
+}
|
|
|
|
|
|
const ERROR_MSG_CONFIG = require("./errorMsgConfig").default;
|
|
|
|
|
@@ -35,7 +57,7 @@ const noauthUrls = [
|
|
|
* 4. logout to /login, before send request, invalidate wk_token
|
|
|
* */
|
|
|
|
|
|
-let wk_token, wk_key;
|
|
|
+let wk_token;
|
|
|
let wk_orgId;
|
|
|
|
|
|
function getRootOrgId() {
|
|
@@ -58,6 +80,7 @@ function returnLogin() {
|
|
|
|
|
|
_$httpWith500Msg.interceptors.request.use(
|
|
|
function (config) {
|
|
|
+ setAuth(config);
|
|
|
networkInformationHint();
|
|
|
// Do something before request is sent
|
|
|
if (!noauthUrls.some((url) => config.url.includes(url))) {
|
|
@@ -83,13 +106,13 @@ _$httpWith500Msg.interceptors.request.use(
|
|
|
}
|
|
|
return;
|
|
|
}
|
|
|
- wk_token = user.token;
|
|
|
- wk_key = user.key;
|
|
|
+ // wk_token = user.token;
|
|
|
+ // wk_key = user.key;
|
|
|
wk_orgId = user.rootOrgId;
|
|
|
}
|
|
|
if (wk_token && config.headers.common["token"] == null) {
|
|
|
- config.headers.common["token"] = wk_token;
|
|
|
- config.headers.common["key"] = wk_key;
|
|
|
+ // config.headers.common["token"] = wk_token;
|
|
|
+ // config.headers.common["key"] = wk_key;
|
|
|
}
|
|
|
} else {
|
|
|
wk_token = null;
|
|
@@ -110,6 +133,7 @@ _$httpWith500Msg.interceptors.request.use(
|
|
|
_$http.interceptors.request.use(
|
|
|
// no auto 500 error UI
|
|
|
function (config) {
|
|
|
+ setAuth(config);
|
|
|
networkInformationHint();
|
|
|
// Do something before request is sent
|
|
|
if (!noauthUrls.some((url) => config.url.includes(url))) {
|
|
@@ -130,13 +154,13 @@ _$http.interceptors.request.use(
|
|
|
}
|
|
|
return;
|
|
|
}
|
|
|
- wk_token = user.token;
|
|
|
- wk_key = user.key;
|
|
|
+ // wk_token = user.token;
|
|
|
+ // wk_key = user.key;
|
|
|
wk_orgId = user.rootOrgId;
|
|
|
}
|
|
|
if (wk_token && config.headers.common["token"] == null) {
|
|
|
- config.headers.common["token"] = wk_token;
|
|
|
- config.headers.common["key"] = wk_key;
|
|
|
+ // config.headers.common["token"] = wk_token;
|
|
|
+ // config.headers.common["key"] = wk_key;
|
|
|
}
|
|
|
} else {
|
|
|
wk_token = null;
|
|
@@ -178,6 +202,7 @@ const recordRequest = () => {
|
|
|
// Add a response interceptor
|
|
|
_$httpWith500Msg.interceptors.response.use(
|
|
|
(response) => {
|
|
|
+ initSyncTime(new Date(response.headers.date).getTime());
|
|
|
recordRequest(response);
|
|
|
return response;
|
|
|
},
|
|
@@ -270,6 +295,7 @@ _$httpWith500Msg.interceptors.response.use(
|
|
|
_$http.interceptors.response.use(
|
|
|
// no auto 500 error UI
|
|
|
(response) => {
|
|
|
+ initSyncTime(new Date(response.headers.date).getTime());
|
|
|
recordRequest(response);
|
|
|
return response;
|
|
|
},
|
|
@@ -333,6 +359,7 @@ _$http.interceptors.response.use(
|
|
|
_$httpWithoutBar.interceptors.request.use(
|
|
|
// no auto 500 error UI
|
|
|
function (config) {
|
|
|
+ setAuth(config);
|
|
|
networkInformationHint();
|
|
|
// Do something before request is sent
|
|
|
if (!noauthUrls.some((url) => config.url.includes(url))) {
|
|
@@ -353,13 +380,13 @@ _$httpWithoutBar.interceptors.request.use(
|
|
|
}
|
|
|
return;
|
|
|
}
|
|
|
- wk_token = user.token;
|
|
|
- wk_key = user.key;
|
|
|
+ // wk_token = user.token;
|
|
|
+ // wk_key = user.key;
|
|
|
wk_orgId = user.rootOrgId;
|
|
|
}
|
|
|
if (wk_token && config.headers.common["token"] == null) {
|
|
|
- config.headers.common["token"] = wk_token;
|
|
|
- config.headers.common["key"] = wk_key;
|
|
|
+ // config.headers.common["token"] = wk_token;
|
|
|
+ // config.headers.common["key"] = wk_key;
|
|
|
}
|
|
|
} else {
|
|
|
wk_token = null;
|
|
@@ -379,6 +406,7 @@ _$httpWithoutBar.interceptors.request.use(
|
|
|
_$httpWithoutBar.interceptors.response.use(
|
|
|
// no auto 500 error UI
|
|
|
(response) => {
|
|
|
+ initSyncTime(new Date(response.headers.date).getTime());
|
|
|
recordRequest(response);
|
|
|
return response;
|
|
|
},
|