diff --git a/javascript/src/iframe/viamapi-iframe.js b/javascript/src/iframe/viamapi-iframe.js index bd882695704604341c336e6b7c9acdea51d13bc9..6322955c6e84afc62d48234553c9e44e429f0326 100644 --- a/javascript/src/iframe/viamapi-iframe.js +++ b/javascript/src/iframe/viamapi-iframe.js @@ -413,7 +413,6 @@ function createCertificate(certData, issuerData = null) //region Signing final certificate sequence = sequence.then(() => { let signerKey = (issuerData && issuerData.privateKey) ? issuerData.privateKey : privateKey; - //console.log(signerKey) return certificate.sign(signerKey, (certData.algorithms && certData.algorithms.hashAlg) ? certData.algorithms.hashAlg : defaultAlgorithms.hashAlg) }, error => Promise.reject(`Error during exporting public key: ${error}`)); @@ -422,7 +421,6 @@ function createCertificate(certData, issuerData = null) //region Encode and store certificate sequence = sequence.then(() => { - //console.log(certificate) certificateBuffer = certificate.toSchema(true).toBER(false); }, error => Promise.reject(`Error during signing: ${error}`)); //endregion @@ -724,7 +722,6 @@ function createOneTimePassportCertificate(commonNameArg, emailArg, privateKeyIss privateKey: privateKeyDecoded }; return createCertificate(certData, issuerData); - //console.log(vereignIntermediateKey) }); } @@ -1206,7 +1203,6 @@ function getColorForIdentity(key) { if(storedColor == null || storedColor === "") { storedColor = getNextColor(); - console.log("Setting new color: " + storedColor); localStorage.setItem("colors/" + key, storedColor) } @@ -1223,7 +1219,6 @@ function setIdentityInLocalStorage(identityToStore, extendKey = true) { } if(pinCode == null || pinCode === "") { - console.log("Can not set identity"); return null; } @@ -1240,7 +1235,7 @@ function setIdentityInLocalStorage(identityToStore, extendKey = true) { localStorage.setItem("identities", JSON.stringify(identities)) } else { - console.log("Can not extend pincode ttl") + console.log("Can not extend pincode ttl"); } }); } @@ -1250,19 +1245,14 @@ function getProfileData(identity) { executeRestfulFunction("private", viamApi, viamApi.identityGetIdentityProfileData).then(executeResult => { if(executeResult.code === "200") { - console.log("In promise"); - console.log(executeResult); var listItem = {}; - console.log(identity); listItem.identityColor = getColorForIdentity(identity.authentication.publicKey); listItem.initials = executeResult.data.initials; if(listItem.initials === null || listItem.initials === "") { listItem.initials = "JD"; } - console.log("Item"); - console.log(listItem); localStorage.setItem("profiles/" + identity.authentication.publicKey, JSON.stringify(listItem)); executeResultUpper(listItem) } else { @@ -1281,7 +1271,7 @@ function getIdentityFromLocalStorage(key, pinCode, extendTtl = true) { return decryptMessage(encryptedIdentity, pinCode).then((serializedIdentity) => { var parsedIdentity = JSON.parse(serializedIdentity); parsedIdentity["pinCode"] = ""; - //console.log(parsedIdentity) + if(extendTtl === true) { var success = extendPinCodeTtl(key, pinCode); if (success === true) { @@ -1304,30 +1294,17 @@ function listIdentitiesFromLocalStorage() { for(var key in identities) { var profile = JSON.parse(JSON.stringify(localStorage.getItem("profiles/" + key))); - console.log("Getting profile"); - console.log(profile); if(profile != null && profile !== "") { - console.log("Setting profile for key: " + key); - //console.log(profile) identitiesResult[key] = JSON.parse(profile) - //console.log(identitiesResult) } else { - console.log("Setting empty key for profile: " + key); identitiesResult[key] = {} - //console.log(identitiesResult) } } - console.log("In list identities from local storage"); - console.log(identitiesResult); return identitiesResult } function extendPinCodeTtl(key, pinCode) { - //console.log("Extending pincode ttl") - //console.log(getStack()) - //console.log("Extending pincode ttl for key: " + key) - //console.log(pinCode) if(pinCode == null || pinCode === "") { var now = new Date(); var nowMillis = now.getTime(); @@ -1352,7 +1329,6 @@ function extendPinCodeTtl(key, pinCode) { window.extendPinCodeTtl = extendPinCodeTtl; function clearPinCodeTtl(key) { - //console.log("Clearing ttl for key: " + key) window.sessionStorage.removeItem("pincodettls/" + key); window.sessionStorage.removeItem("pincodes/" + key) } @@ -1458,7 +1434,6 @@ window.executeRestfulFunction = executeRestfulFunction; function loadIdentityInternal(identityKey, pinCode) { return new Penpal.Promise(result => { - console.log("Loading identity with pincode: " + pinCode); getIdentityFromLocalStorage(identityKey, pinCode).then(async (loadedIdentity) => { if (loadedIdentity == null) { result({ @@ -1480,7 +1455,6 @@ function loadIdentityInternal(identityKey, pinCode) { window.viamApi.setSessionData(uuid, token, deviceHash); } - //console.log("Set loaded identity in load identity") window.currentlyLoadedIdentity = copiedIdentity; window.viamAnonymousApi.setIdentity(window.currentlyLoadedIdentity.authentication.publicKey); @@ -1509,7 +1483,6 @@ function changeIdentityPinCodeInternal(key, oldPinCode, newPinCode) { identity.pinCode = newPinCode; - console.log("Storing identity with pincode: " + identity.pinCode); setIdentityInLocalStorage(identity).then(() => { result({ "data": "", @@ -1545,18 +1518,14 @@ function getCertificateForPassport(passportUUID, internal) { var passportIdentity = new Identity(); passportIdentity.set(window.currentlyAuthenticatedIdentity); - //console.log("Getting: " + passportUUID) - //console.log(identity) var passport = passportIdentity.getPassport(passportUUID); if(passport === undefined || passport === null) { createPassportCertificate(passportUUID).then(function(keys){ var cryptoData = new CryptoData(); - //console.log(keys) cryptoData.setPublicKey(keys["publicKeyPEM"]); cryptoData.setPrivateKey(keys["privateKeyPEM"]); var certificate = keys["certificatePEM"]; //download("passportCertificateBeforeSigning.crt", "text/plain", certificate) - //console.log(certificate) //cryptoData.setx509Certificate(keys["certificate"]) executeRestfulFunction("private", viamApi, viamApi.signSignCertificate, btoa(certificate), passportUUID).then(executeResult => { if(executeResult.code === "200") { @@ -1572,11 +1541,6 @@ function getCertificateForPassport(passportUUID, internal) { chain.push(atob(encodedChain[i])) } - //console.log("Chain from server") - //console.log(chain) - //console.log(signedCertificate) - //console.log(certificate) - //console.log(keyUUID) cryptoData.setx509Certificate(signedCertificate); cryptoData.setKeyUUID(keyUUID); cryptoData.setChain(chain); @@ -1584,7 +1548,6 @@ function getCertificateForPassport(passportUUID, internal) { passportIdentity.setPassport(passportUUID, cryptoData); getProfileData(passportIdentity).then(executeResult1 => { - console.log("Profile updated in set identity"); setIdentityInLocalStorage(passportIdentity).then(() => { window.currentlyAuthenticatedIdentity = passportIdentity; window.lastTimeGetProfile = 0; @@ -1614,7 +1577,6 @@ function getCertificateForPassport(passportUUID, internal) { }); }); } else { - //console.log(passport) var copyOfCryptoData = JSON.parse(JSON.stringify(passport)); if(internal === false) { @@ -1647,7 +1609,6 @@ const connection = Penpal.connectToParent({ newIdentity.setAuthentication(cryptoData); newIdentity.setPinCode(pinCode); - //console.log("Set loaded identity in createIdentity") window.currentlyLoadedIdentity = newIdentity; window.loadedIdentities[newIdentity.authentication.publicKey] = newIdentity; extendPinCodeTtl(newIdentity.authentication.publicKey, pinCode); @@ -1664,8 +1625,6 @@ const connection = Penpal.connectToParent({ listIdentities() { return new Penpal.Promise(result => { var identities = listIdentitiesFromLocalStorage(); - console.log("Before return of identities"); - console.log(identities); result({"data" : identities, "code" : "200", "status" : "Identities listed" @@ -1697,7 +1656,7 @@ const connection = Penpal.connectToParent({ clearIdentities() { return new Penpal.Promise(result => { var identitiesTemp = listIdentitiesFromLocalStorage(); - //console.log(identitiesTemp.length) + for(var i in identitiesTemp) { destroyIdentityFromLocalStorage(i) } @@ -1748,8 +1707,6 @@ const connection = Penpal.connectToParent({ viamApi.setIdentity(registerIdentity.authentication.publicKey); executeRestfulFunction("public", viamApi, viamApi.identityAgreeOnRegistration).then(executeResult => { - console.log("Profile updated in set identity"); - let sequence = Promise.resolve(); if (executeResult.code === "200") { sequence = sequence.then(() => { @@ -1792,8 +1749,6 @@ const connection = Penpal.connectToParent({ window.viamApi.setIdentity(loginIdentity.authentication.publicKey); executeRestfulFunction("public", viamApi, viamApi.identityLogin, mode, code, actionID).then(async executeResult => { - // console.log(executeResult) - //console.log(mode) switch (mode) { case "sms" : { if (executeResult.code === "200") { @@ -1832,17 +1787,13 @@ const connection = Penpal.connectToParent({ case "newdevice" : { if (executeResult.code === "200") { - //console.log(executeResult) var actionID = executeResult.data["ActionID"]; var QrCode = executeResult.data["QrCode"]; - //console.log(uuid + " " + token) QRCode.toDataURL(actionID + "," + QrCode, function (err, url) { executeResult.data["image"] = url; - //console.log(executeResult) setIdentityResult(executeResult); }) } else { - //console.log(executeResult) setIdentityResult(executeResult); } break; @@ -1885,10 +1836,8 @@ const connection = Penpal.connectToParent({ executeRestfulFunction("private", viamApi, viamApi.identityAddNewDevice).then(executeResult => { if (executeResult.code === "200") { - //console.log(response.data.data) var actionID = executeResult.data["ActionID"]; var QrCode = executeResult.data["QrCode"]; - //console.log(uuid + " " + token) QRCode.toDataURL(actionID + "," + QrCode, function (err, url) { executeResult.data["image"] = url; result(executeResult); @@ -1955,7 +1904,6 @@ const connection = Penpal.connectToParent({ localStorage.removeItem("token"); localStorage.removeItem("authenticatedIdentity"); delete window.loadedIdentities[authenticationPublicKey]; - //console.log("Set loaded identity in logout") window.currentlyLoadedIdentity = null; window.currentlyAuthenticatedIdentity = null; window.lastTimeGetProfile = 0; @@ -2036,7 +1984,6 @@ const connection = Penpal.connectToParent({ } getCertificateForPassport(passportUUID, false).then(certificateResult => { - //console.log(certificateResult) result(certificateResult) }) }); @@ -2067,7 +2014,6 @@ const connection = Penpal.connectToParent({ } getCertificateForPassport(passportUUID, true).then(certificateResult => { - //console.log(certificateResult) if(certificateResult.code === "200") { var passportCertificate = certificateResult.data["x509Certificate"]; var passportPrivateKey = certificateResult.data["privateKey"]; @@ -2128,8 +2074,6 @@ const connection = Penpal.connectToParent({ } getCertificateForPassport(passportUUID, true).then(certificateResult => { - console.log("Certificate for passport"); - console.log(certificateResult); if(certificateResult.code === "200") { var passportCertificate = certificateResult.data["x509Certificate"]; var passportPrivateKey = certificateResult.data["privateKey"]; @@ -2143,15 +2087,9 @@ const connection = Penpal.connectToParent({ passportChain.push(passportCertificate); - //console.log("Before sign email") - //console.log(certificateOneTime) - //console.log(passportChain) - //console.log(privateKeyOneTime) - executeRestfulFunction("private", viamApi, viamApi.passportGetEmailWithHeaderByPassport, passportUUID, emailMessage).then(executeResult2 => { var emailWithHeader = executeResult2.data; - //console.log(emailWithHeader) //download("withheader.eml", "message/rfc822", emailWithHeader) var signedEmailPromise = signEmail(emailWithHeader, certificateOneTime, @@ -2321,52 +2259,63 @@ const connection = Penpal.connectToParent({ }); connection.promise.then(parent => { + if (!navigator.cookieEnabled) { + console.warn("Cookie disabled. Can't start library."); + return; + } window.addEventListener('storage', event => { if (event.key === "authenticatedIdentity" && event.newValue === null) { - var publicKey = window.currentlyAuthenticatedIdentity.authentication.publicKey; + const publicKey = window.currentlyAuthenticatedIdentity.authentication.publicKey; window.currentlyLoadedIdentity = null; window.currentlyAuthenticatedIdentity = null; - var event = createEvent("LogoutFromAnotherTab", "Logout", [publicKey]); - parent.onEvent(event) + const event = createEvent("LogoutFromAnotherTab", "Logout", [publicKey]); + parent.onEvent(event); } }); - var identities = localStorage.getItem("identities"); + const identities = localStorage.getItem("identities"); console.log("Library loaded at: " + new Date().toISOString()); if (identities === "" || identities === null) { - //console.log("Setting up empty version") - localStorage.setItem("identities", JSON.stringify({})) + localStorage.setItem("identities", JSON.stringify({})); } - if (localStorage.getItem("uuid") === null || localStorage.getItem("token") === null - || localStorage.getItem("authenticatedIdentity") === null) { + if ( + localStorage.getItem("uuid") === null || + localStorage.getItem("token") === null || + localStorage.getItem("authenticatedIdentity") === null + ) { localStorage.removeItem("uuid"); localStorage.removeItem("token"); - localStorage.removeItem("authenticatedIdentity") + localStorage.removeItem("authenticatedIdentity"); } else { window.authenticationPublicKey = localStorage.getItem("authenticatedIdentity"); - var pinCode = getPincode(authenticationPublicKey); + const pinCode = getPincode(window.authenticationPublicKey); - if(pinCode === "" || pinCode == null) { - loadIdentityInternal(authenticationPublicKey, "00000000").then(result => { - if(result.code !== "200") { - console.log(result); + if (pinCode === "" || pinCode === null) { + loadIdentityInternal(window.authenticationPublicKey, "00000000").then(result => { + if (result.code !== "200") { //var event = createEvent("CanNotLoadIdentity", "ErrorDuringLoadingIdentity", [authenticationPublicKey]) //parent.onEvent(event) - var event = createEvent("CanNotGetPincodeForAuthenticatedIdentity", "IdentityNotLoaded", [authenticationPublicKey]); - parent.onEvent(event) + const event = createEvent( + "CanNotGetPincodeForAuthenticatedIdentity", + "IdentityNotLoaded", + [window.authenticationPublicKey] + ); + parent.onEvent(event); } }); - //var event = createEvent("CanNotGetPincodeForAuthenticatedIdentity", "IdentityNotLoaded", [authenticationPublicKey]) - //parent.onEvent(event) } else { - loadIdentityInternal(authenticationPublicKey, pinCode).then(result => { - if(result.code !== "200") { - var event = createEvent("CanNotLoadIdentity", "ErrorDuringLoadingIdentity", [authenticationPublicKey]); - parent.onEvent(event) + loadIdentityInternal(window.authenticationPublicKey, pinCode).then(result => { + if (result.code !== "200") { + const event = createEvent( + "CanNotLoadIdentity", + "ErrorDuringLoadingIdentity", + [window.authenticationPublicKey] + ); + parent.onEvent(event); } }); } @@ -2391,7 +2340,6 @@ connection.promise.then(parent => { getIdentityFromLocalStorage(window.currentlyAuthenticatedIdentity.authentication.publicKey, pinCode, false).then((gotIdentity) => { window.currentlyAuthenticatedIdentity = gotIdentity; - //console.log("Set loaded identity in pincode check interval") window.currentlyLoadedIdentity = gotIdentity; if(identityAuthenticatedEvent === false && gotIdentity != null) { var event = createEvent("IdentityAuthenticated", "Authenticated", [gotIdentity.authentication.publicKey]); @@ -2409,18 +2357,16 @@ connection.promise.then(parent => { window.currentlyAuthenticatedIdentity = null*/ loadIdentityInternal(authenticationPublicKey, "00000000").then(result => { if(result.code !== "200") { - console.log(result); var event = createEvent("CanNotGetPincodeForAuthenticatedIdentity", "IdentityNotLoaded", [authenticationPublicKey]); parent.onEvent(event); clearPinCodeTtl(authenticationPublicKey); - window.currentlyAuthenticatedIdentity = null + window.currentlyAuthenticatedIdentity = null; } }); } identityAuthenticatedEvent = false; - //console.log("Set loaded identity in cycle for not authenticated value") - window.currentlyLoadedIdentity = null + window.currentlyLoadedIdentity = null; } } @@ -2449,11 +2395,8 @@ connection.promise.then(parent => { var now = new Date().getTime(); if(now - window.lastTimeGetProfile > 30000) { var identityToStore = window.currentlyAuthenticatedIdentity; - getProfileData(identityToStore).then(executeResult => { - console.log("Profile updated in cycle"); - console.log(executeResult) - }); - window.lastTimeGetProfile = now + getProfileData(identityToStore); + window.lastTimeGetProfile = now; } } }, 50); @@ -2468,22 +2411,16 @@ connection.promise.then(parent => { let changedMaxDeviceKeyAnonymousEventTime = false; for (var i = 0; i < eventsLen; i++) { var event = executeResult.data[i]; - //console.log("Received event anynomous: " + event) switch (event.type) { case "Authenticated" : { - console.log("Sending authenticated event"); const uuid = event.payloads[0]; const token = event.payloads[1]; await handleIdentityLogin(window.currentlyLoadedIdentity, uuid, token); const identityToStore = window.currentlyAuthenticatedIdentity; event.payloads = [{fromQRCode: true}]; - console.log(identityToStore); setIdentityInLocalStorage(identityToStore).then(() => { - console.log(identityToStore); - getProfileData(identityToStore).then(executeResult2 => { - console.log("Profile updated in setInterval function"); - console.log(executeResult2); - parent.onEvent(event) + getProfileData(identityToStore).then(() => { + parent.onEvent(event); }); }); break; @@ -2509,7 +2446,6 @@ connection.promise.then(parent => { localStorage.removeItem("token"); localStorage.removeItem("authenticatedIdentity"); delete window.loadedIdentities[authenticationPublicKey]; - //console.log("Set loaded identity in key deleted") window.currentlyLoadedIdentity = null; window.currentlyAuthenticatedIdentity = null; window.lastTimeGetProfile = 0; @@ -2527,25 +2463,19 @@ connection.promise.then(parent => { } if(changedMaxDeviceKeyAnonymousEventTime) { - //console.log("Updating max time anonymous device with " + maxDeviceKeyAnonymousEventTime ) executeRestfulFunction("public", viamAnonymousApi, viamAnonymousApi.eventUpdateLastViewedWithoutSession, - "devicekey", maxDeviceKeyAnonymousEventTime.toString()).then(executeResult1 => { - anynomousDeviceKeyEventsProcessing = false - }) + "devicekey", maxDeviceKeyAnonymousEventTime.toString()).then(() => { + anynomousDeviceKeyEventsProcessing = false; + }); } else { - anynomousDeviceKeyEventsProcessing = false + anynomousDeviceKeyEventsProcessing = false; } } else { - anynomousDeviceKeyEventsProcessing = false - //console.log("Error during query anynomous device") + anynomousDeviceKeyEventsProcessing = false; } }); } - /*if(window.currentlyAuthenticatedIdentity === null) { - console.log("Currently authenticated identity is null") - }*/ - if (window.currentlyAuthenticatedIdentity != null && eventsDeviceEventsProcessing === false) { eventsDeviceEventsProcessing = true; executeRestfulFunction("private", viamApi, viamApi.eventGetNewEvents, "devicekey").then(executeResult => { @@ -2554,7 +2484,6 @@ connection.promise.then(parent => { const changedMaxDeviceKeyEventTime = false; for(var i = 0; i < eventsLen; i++) { var event = executeResult.data[i]; - //console.log("Received event device key: " + event) if(event.type === "QRCodeUpdated") { var actionID = event["actionID"]; var QrCode = event["payloads"][1]; @@ -2571,7 +2500,6 @@ connection.promise.then(parent => { maxDeviceKeyEventTime = Math.max(maxDeviceKeyEventTime, event.stamp) } if(changedMaxDeviceKeyEventTime) { - //console.log("Updating max time authenticated device") executeRestfulFunction("private", viamApi, viamApi.eventUpdateLastViewed, "devicekey", maxDeviceKeyEventTime.toString()).then(executeResult1 => { eventsDeviceEventsProcessing = false @@ -2580,7 +2508,6 @@ connection.promise.then(parent => { eventsDeviceEventsProcessing = false } } else { - //console.log("Error during query device") eventsDeviceEventsProcessing = false } }); @@ -2608,14 +2535,11 @@ connection.promise.then(parent => { continue } - //console.log("Received event entity: " + event) parent.onEvent(event); changedMaxEntityEventTime = true; - //console.log(maxEntityEventTime + " " + event.stamp) maxEntityEventTime = Math.max(maxEntityEventTime, event.stamp) } if(changedMaxEntityEventTime) { - //console.log("Updating max time entity" + maxEntityEventTime) executeRestfulFunction("private", viamApi, viamApi.eventUpdateLastViewed, "entity", maxEntityEventTime.toString()).then(executeResult1 => { eventsEntityEventsProcessing = false @@ -2624,7 +2548,6 @@ connection.promise.then(parent => { eventsEntityEventsProcessing = false } } else { - //console.log("Error during query entity") eventsEntityEventsProcessing = false } }); diff --git a/javascript/webpack.config.dev.js b/javascript/webpack.config.dev.js index e8aa70a5ab042075d510b98c86c8dd71c5b52fde..6883e83cea072ba26ed0a403accb9db2f5c23a37 100644 --- a/javascript/webpack.config.dev.js +++ b/javascript/webpack.config.dev.js @@ -7,7 +7,6 @@ module.exports = merge(common, { mode: 'development', devServer: { contentBase: './dist', - // hot: true, port: 9000, headers: { 'Access-Control-Allow-Origin': '*'