diff --git a/Gopkg.toml b/Gopkg.toml index 7e752095a137fa69907fe401e8baa8072079573a..349b503370d11addf17bca0a46703d4e5aa98825 100644 --- a/Gopkg.toml +++ b/Gopkg.toml @@ -25,7 +25,7 @@ # unused-packages = true [[constraint]] - branch = "390-device-management-ability-to-remove-device" + branch = "master" name = "code.vereign.com/code/restful-api" [prune] diff --git a/javascript/package.json b/javascript/package.json index 1cc608b267fb1be5d7df4e7551dca5cb29716d6b..bab32fc9af6cad2dda7cab5aa4307bebd8a0a301 100644 --- a/javascript/package.json +++ b/javascript/package.json @@ -28,6 +28,7 @@ "data-uri-to-blob": "^0.0.4", "libmime": "^4.0.1", "libqp": "^1.1.0", + "lodash": "^4.17.11", "penpal": "^3.0.3", "pkijs": "^2.1.69", "pvutils": "^1.0.16", diff --git a/javascript/src/iframe/viamapi-iframe.js b/javascript/src/iframe/viamapi-iframe.js index a05fdd085cebcf19c55a28ce31b5dc512f451caf..7e363315bc4206db21018877603467aae71b98d6 100644 --- a/javascript/src/iframe/viamapi-iframe.js +++ b/javascript/src/iframe/viamapi-iframe.js @@ -98,7 +98,7 @@ function setIdentityInLocalStorage(identityToStore, extendKey = true) { function getProfileData(identity) { return new Penpal.Promise(executeResultUpper => { executeRestfulFunction("private", viamApi, - viamApi.identityGetIdentityProfileData).then(executeResult => { + viamApi.identityGetIdentityProfileData, null).then(executeResult => { if(executeResult.code === "200") { var listItem = {}; @@ -246,11 +246,11 @@ const handleIdentityLogin = (identity, uuid, token) => { setKeyForUUID(uuid, publicKey); }; -function executeRestfulFunction(type, that, fn, ...args) { +function executeRestfulFunction(type, that, fn, config, ...args) { const { currentlyAuthenticatedIdentity, viamApi, currentlyLoadedIdentity } = window; return new Penpal.Promise(executeResult => { - fn.apply(that, args).then(async (response) => { + fn.apply(that, [config, ...args]).then(async (response) => { const identity = currentlyAuthenticatedIdentity || currentlyLoadedIdentity; const { code, status } = response.data; @@ -266,14 +266,13 @@ function executeRestfulFunction(type, that, fn, ...args) { } if (type === "private" && identity && code === "400" && status === "Bad session") { - viamApi.identityLogin("previousaddeddevice") + viamApi.identityLogin(null, "previousaddeddevice") .then((response) => { if (response.data.code === "200") { const uuid = response.data.data["Uuid"]; const token = response.data.data["Session"]; handleIdentityLogin(identity, uuid, token); - // TODO: Previously there was fn.apply(null, args) where null is probably wrong context for fn.apply() - fn.apply(that, args).then(({data}) => executeResult(data)); + fn.apply(that, [config, ...args]).then(({data}) => executeResult(data)); } else { executeResult(response.data); } @@ -387,7 +386,7 @@ function getCertificateForPassport(passportUUID, internal) { var certificate = keys["certificatePEM"]; //download("passportCertificateBeforeSigning.crt", "text/plain", certificate) //cryptoData.setx509Certificate(keys["certificate"]) - executeRestfulFunction("private", viamApi, viamApi.signSignCertificate, btoa(certificate), passportUUID).then(executeResult => { + executeRestfulFunction("private", viamApi, viamApi.signSignCertificate, null, btoa(certificate), passportUUID).then(executeResult => { if(executeResult.code === "200") { var signedCertificate = atob(executeResult.data["SignedCertificate"]); //download("passportCertificateAfterSigning.crt", "text/plain", signedCertificate) @@ -474,6 +473,7 @@ const connection = Penpal.connectToParent({ window.WOPI_URL = wopiUrl.charAt(wopiUrl.length - 1) === "/" ? wopiUrl : wopiUrl + "/"; window.COLLABORA_URL = collaboraUrl.charAt(collaboraUrl.length - 1) === "/" ? collaboraUrl : collaboraUrl + "/"; }, + ...penpalMethods, createIdentity(pinCode) { return new Penpal.Promise(result => { createPassportCertificate(makeid()).then(function(keys){ @@ -546,7 +546,7 @@ const connection = Penpal.connectToParent({ return new Penpal.Promise(result => { viamApi.setIdentity(identity.authentication.publicKey); - executeRestfulFunction("public", viamApi, viamApi.identityConfirmIdentificator,confirmationCodeArg).then(executeResult => { + executeRestfulFunction("public", viamApi, viamApi.identityConfirmIdentificator, null, confirmationCodeArg).then(executeResult => { result(executeResult); }); }); @@ -555,7 +555,7 @@ const connection = Penpal.connectToParent({ return new Penpal.Promise(result => { viamApi.setIdentity(identity.authentication.publicKey); - executeRestfulFunction("public", viamApi, viamApi.identityGetIdentificatorByRegisterToken,tokenArg).then(executeResult => { + executeRestfulFunction("public", viamApi, viamApi.identityGetIdentificatorByRegisterToken, null, tokenArg).then(executeResult => { result(executeResult); }); }); @@ -564,7 +564,7 @@ const connection = Penpal.connectToParent({ return new Penpal.Promise(result => { viamApi.setIdentity(identity.authentication.publicKey); - executeRestfulFunction("public", viamApi, viamApi.identitySubmitIdentificator,identificatorArg, registerToken).then(executeResult => { + executeRestfulFunction("public", viamApi, viamApi.identitySubmitIdentificator, null, identificatorArg, registerToken).then(executeResult => { result(executeResult); }); }); @@ -573,7 +573,7 @@ const connection = Penpal.connectToParent({ return new Penpal.Promise(result => { viamApi.setIdentity(identity.authentication.publicKey); - executeRestfulFunction("public", viamApi, viamApi.identitySubmitRegisterClaims,givennameArg,familynameArg,emailArg,phonenumberArg).then(executeResult => { + executeRestfulFunction("public", viamApi, viamApi.identitySubmitRegisterClaims, null, givennameArg,familynameArg,emailArg,phonenumberArg).then(executeResult => { result(executeResult); }); }); @@ -582,7 +582,7 @@ const connection = Penpal.connectToParent({ return new Penpal.Promise(result => { viamApi.setIdentity(registerIdentity.authentication.publicKey); - executeRestfulFunction("public", viamApi, viamApi.identityAgreeOnRegistration).then(executeResult => { + executeRestfulFunction("public", viamApi, viamApi.identityAgreeOnRegistration, null).then(executeResult => { let sequence = Promise.resolve(); if (executeResult.code === "200") { sequence = sequence.then(() => { @@ -606,7 +606,7 @@ const connection = Penpal.connectToParent({ return new Penpal.Promise(result => { viamApi.setIdentity(identity.authentication.publicKey); - executeRestfulFunction("public", viamApi, viamApi.identityResendConfirmationCode,identificatorArg).then(executeResult => { + executeRestfulFunction("public", viamApi, viamApi.identityResendConfirmationCode, null, identificatorArg).then(executeResult => { result(executeResult); }); }); @@ -629,6 +629,7 @@ const connection = Penpal.connectToParent({ "public", window.viamApi, window.viamApi.identityLogin, + null, mode, requestCode, requestActionID ); @@ -679,7 +680,7 @@ const connection = Penpal.connectToParent({ }) } - executeRestfulFunction("private", viamApi, viamApi.identityAddNewDevice).then(executeResult => { + executeRestfulFunction("private", viamApi, viamApi.identityAddNewDevice, null).then(executeResult => { if (executeResult.code === "200") { var actionID = executeResult.data["ActionID"]; var QrCode = executeResult.data["QrCode"]; @@ -718,7 +719,7 @@ const connection = Penpal.connectToParent({ }) } - executeRestfulFunction("private", viamApi, viamApi.identityDestroyKeysForDevice, btoa(authenticationPublicKeyArg)).then(executeResult => { + executeRestfulFunction("private", viamApi, viamApi.identityDestroyKeysForDevice, null, btoa(authenticationPublicKeyArg)).then(executeResult => { result(executeResult); }); }); @@ -736,7 +737,8 @@ const connection = Penpal.connectToParent({ const identityLogoutResponse = await executeRestfulFunction( "private", window.viamApi, - window.viamApi.identityLogout + window.viamApi.identityLogout, + null ); destroyAuthentication(); @@ -747,7 +749,7 @@ const connection = Penpal.connectToParent({ return new Penpal.Promise(result => { viamApi.setIdentity(restoreAccessIdentity.authentication.publicKey); - executeRestfulFunction("public", viamApi, viamApi.identityRestoreAccess, identificator).then(executeResult => { + executeRestfulFunction("public", viamApi, viamApi.identityRestoreAccess, null, identificator).then(executeResult => { result(executeResult); }); }); @@ -912,7 +914,7 @@ const connection = Penpal.connectToParent({ passportChain.push(passportCertificate); response = await executeRestfulFunction( - "private", window.viamApi, window.viamApi.passportGetEmailWithHeaderByPassport, passportUUID, emailMessage); + "private", window.viamApi, window.viamApi.passportGetEmailWithHeaderByPassport, null, passportUUID, emailMessage); if (response.code !== "200") { return encodeResponse("400", "", response.status); @@ -921,7 +923,7 @@ const connection = Penpal.connectToParent({ const signedEmail = await signEmail(response.data, certificateOneTime, passportChain, privateKeyOneTime); response = await executeRestfulFunction( - "private", window.viamApi, window.viamApi.signResignEmail, passportUUID, signedEmail); + "private", window.viamApi, window.viamApi.signResignEmail, null, passportUUID, signedEmail); if (response.code !== "200") { return encodeResponse("400", "", response.status); @@ -929,6 +931,51 @@ const connection = Penpal.connectToParent({ return encodeResponse("200", response.data, "Email signed"); }, + documentCreateDocument: async (path, passportUUID, contenttype) => { + const authenticationPublicKey = localStorage.getItem("authenticatedIdentity"); + if ( + !authenticationPublicKey || + !window.loadedIdentities[authenticationPublicKey] || + !extendPinCodeTtl(authenticationPublicKey) + ) { + return encodeResponse("400", "", "Identity not authenticated"); + } + + const config = { + headers: { + path, + passportuuid: passportUUID, + contenttype + } + }; + const response = await executeRestfulFunction("private", window.viamApi, window.viamApi.documentCreateDocument, + config); + + return encodeResponse("200", response.data, "Document created"); + }, + documentPutDocument: async (passportUUID, resourceid, file) => { + const authenticationPublicKey = localStorage.getItem("authenticatedIdentity"); + if ( + !authenticationPublicKey || + !window.loadedIdentities[authenticationPublicKey] || + !extendPinCodeTtl(authenticationPublicKey) + ) { + return encodeResponse("400", "", "Identity not authenticated"); + } + + const config = { + headers: { + 'Content-Type': 'multipart/form-data', + passportuuid: passportUUID, + resourceid + } + }; + + const response = await executeRestfulFunction( + "private", window.viamApi, window.viamApi.documentPutDocument, config, file); + + return encodeResponse("200", response.data, "Document created"); + }, hasSession() { return new Penpal.Promise(result => { const authenticationPublicKey = localStorage.getItem("authenticatedIdentity"); @@ -954,7 +1001,7 @@ const connection = Penpal.connectToParent({ }) } - executeRestfulFunction("private", viamApi, viamApi.identityHasSession).then(executeResult => { + executeRestfulFunction("private", viamApi, viamApi.identityHasSession, null).then(executeResult => { result(executeResult); }); }); @@ -963,7 +1010,7 @@ const connection = Penpal.connectToParent({ return new Penpal.Promise(result => { viamApi.setIdentity("marketingapppublickey"); - executeRestfulFunction("public", viamApi, viamApi.marketingSignUpIdentificator, identificator, reference).then(executeResult => { + executeRestfulFunction("public", viamApi, viamApi.marketingSignUpIdentificator, null, identificator, reference).then(executeResult => { viamApi.setIdentity(""); viamApi.setSessionData("", ""); result(executeResult); @@ -974,7 +1021,7 @@ const connection = Penpal.connectToParent({ return new Penpal.Promise(result => { viamApi.setIdentity("marketingapppublickey"); - executeRestfulFunction("public", viamApi, viamApi.marketingGetIdentificatorProfile, identificator, pincode).then(executeResult => { + executeRestfulFunction("public", viamApi, viamApi.marketingGetIdentificatorProfile, null, identificator, pincode).then(executeResult => { viamApi.setIdentity(""); viamApi.setSessionData("", ""); result(executeResult); @@ -985,7 +1032,7 @@ const connection = Penpal.connectToParent({ return new Penpal.Promise(result => { viamApi.setIdentity("marketingapppublickey"); - executeRestfulFunction("public", viamApi, viamApi.marketingExecuteEventForIdentificator, identificator, pincode, event).then(executeResult => { + executeRestfulFunction("public", viamApi, viamApi.marketingExecuteEventForIdentificator, null, identificator, pincode, event).then(executeResult => { viamApi.setIdentity(""); viamApi.setSessionData("", ""); result(executeResult); @@ -1066,10 +1113,42 @@ const connection = Penpal.connectToParent({ result(res) }) }, + + // Collabora APIs collaboraDiscovery() { return collaboraApi.discovery().then(apps => apps); }, - ...penpalMethods + + // WOPI + getPassports: async fileId => { + const authenticationPublicKey = localStorage.getItem("authenticatedIdentity"); + + if ( + !authenticationPublicKey || + !window.loadedIdentities[authenticationPublicKey] || + !extendPinCodeTtl(authenticationPublicKey) + ) { + return encodeResponse("400", "", "Identity not authenticated"); + } + + const response = await wopiAPI.getPassports(fileId); + return response.data; + }, + + wopiPutFile: async (path, accessToken, file) => { + const authenticationPublicKey = localStorage.getItem("authenticatedIdentity"); + + if ( + !authenticationPublicKey || + !window.loadedIdentities[authenticationPublicKey] || + !extendPinCodeTtl(authenticationPublicKey) + ) { + return encodeResponse("400", "", "Identity not authenticated"); + } + + const response = await wopiAPI.putDocument(path, accessToken, file); + return response.data; + } } }); @@ -1208,7 +1287,7 @@ connection.promise.then(parent => { setInterval(function() { if (window.currentlyLoadedIdentity && !anynomousDeviceKeyEventsProcessing && !window.currentlyAuthenticatedIdentity) { anynomousDeviceKeyEventsProcessing = true; - executeRestfulFunction("public", viamAnonymousApi, viamAnonymousApi.eventGetNewEventsWithoutSession, "devicekey").then(async executeResult => { + executeRestfulFunction("public", viamAnonymousApi, viamAnonymousApi.eventGetNewEventsWithoutSession, null, "devicekey").then(async executeResult => { if(executeResult.code === "200") { var eventsLen = executeResult.data.length; let changedMaxDeviceKeyAnonymousEventTime = false; @@ -1267,7 +1346,7 @@ connection.promise.then(parent => { if(changedMaxDeviceKeyAnonymousEventTime) { executeRestfulFunction("public", viamAnonymousApi, viamAnonymousApi.eventUpdateLastViewedWithoutSession, - "devicekey", maxDeviceKeyAnonymousEventTime.toString()).then(() => { + null, "devicekey", maxDeviceKeyAnonymousEventTime.toString()).then(() => { anynomousDeviceKeyEventsProcessing = false; }); } else { @@ -1281,7 +1360,7 @@ connection.promise.then(parent => { if (window.currentlyAuthenticatedIdentity != null && eventsDeviceEventsProcessing === false) { eventsDeviceEventsProcessing = true; - executeRestfulFunction("private", viamApi, viamApi.eventGetNewEvents, "devicekey").then(executeResult => { + executeRestfulFunction("private", viamApi, viamApi.eventGetNewEvents, null, "devicekey").then(executeResult => { if(executeResult.code === "200") { var eventsLen = executeResult.data.length; const changedMaxDeviceKeyEventTime = false; @@ -1303,7 +1382,7 @@ connection.promise.then(parent => { maxDeviceKeyEventTime = Math.max(maxDeviceKeyEventTime, event.stamp) } if(changedMaxDeviceKeyEventTime) { - executeRestfulFunction("private", viamApi, viamApi.eventUpdateLastViewed, "devicekey", + executeRestfulFunction("private", viamApi, viamApi.eventUpdateLastViewed, null, "devicekey", maxDeviceKeyEventTime.toString()).then(executeResult1 => { eventsDeviceEventsProcessing = false }) @@ -1318,7 +1397,7 @@ connection.promise.then(parent => { if (window.currentlyAuthenticatedIdentity != null && eventsEntityEventsProcessing === false) { eventsEntityEventsProcessing = true; - executeRestfulFunction("private", viamApi, viamApi.eventGetNewEvents, "entity").then(executeResult => { + executeRestfulFunction("private", viamApi, viamApi.eventGetNewEvents, null, "entity").then(executeResult => { if(executeResult.code === "200") { var eventsLen = executeResult.data.length; let changedMaxEntityEventTime = false; @@ -1343,7 +1422,7 @@ connection.promise.then(parent => { maxEntityEventTime = Math.max(maxEntityEventTime, event.stamp) } if(changedMaxEntityEventTime) { - executeRestfulFunction("private", viamApi, viamApi.eventUpdateLastViewed, "entity", + executeRestfulFunction("private", viamApi, viamApi.eventUpdateLastViewed, null, "entity", maxEntityEventTime.toString()).then(executeResult1 => { eventsEntityEventsProcessing = false }) diff --git a/javascript/src/iframe/wopiapi-iframe.js b/javascript/src/iframe/wopiapi-iframe.js index 8d5b72aaab4722fc51f4167f93859253fa2901d1..c009f9ed020171a5bafc2a4ff4b97c60aff11f9f 100644 --- a/javascript/src/iframe/wopiapi-iframe.js +++ b/javascript/src/iframe/wopiapi-iframe.js @@ -19,4 +19,25 @@ WopiAPI.prototype.getPassports = function (fileID) { return axios(requestConfig); }; +WopiAPI.prototype.putDocument = function (path, accessToken, file) { + const { publicKey, uuid, token, deviceHash } = window.viamApi.getConfig().headers; + path = path[0] === "/" ? path : `/${path}`; + const requestConfig = { + url: `${window.WOPI_URL}files${path}/contents`, + method: 'POST', + headers: { + publicKey, + uuid, + token, + deviceHash + }, + params: { + access_token: accessToken + }, + data: file + }; + + return axios(requestConfig); +}; + module.exports = WopiAPI; diff --git a/main.go b/main.go index f688ea9944a2a2475ec20e9ca8bb7fe7334b6ff5..b75d0361dd79a16a57b148a044dabdf46e483c9d 100644 --- a/main.go +++ b/main.go @@ -43,7 +43,6 @@ func buildPenpalMethods() string { "export default {\n" methods := generatePenpalRemoteMethods(endPoints) - methods += getWopiAPIPenpalMethods() result += methods @@ -57,6 +56,7 @@ func buildViamAPI() string { endPoints := server.GetEndPoints(prefixes) result := "const axios = require('axios');\n" + result += "const merge = require('lodash/merge');\n" var keys []string for k := range endPoints { @@ -78,7 +78,6 @@ func buildViamAPI() string { " }\n" + "}\n\n" - result += "ViamAPI.prototype.setSessionData = function(uuid, token) {\n" + " this.config.headers.uuid = uuid;\n" + " this.config.headers.token = token;\n" + @@ -103,11 +102,6 @@ func buildViamAPI() string { packageStr := splits[len(splits)-2] - /*if !packageCreated[packageStr] { - result += "ViamAPI.prototype.\"" + packageStr + "\" = {}\n\n" - packageCreated[packageStr] = true - }*/ - methodStr := splits[len(splits)-1] form := endPoints[url].Form @@ -129,7 +123,7 @@ func buildViamAPI() string { } } - result += "ViamAPI.prototype." + packageStr + strings.Title(methodStr) + " = function(" + args + ") {\n" + + result += "ViamAPI.prototype." + packageStr + strings.Title(methodStr) + " = function(config, " + args + ") {\n" + " return axios.post(window.API_HOST + '" + packageStr + "/" + methodStr + "', {\n" for i := 0; i < lenFields; i++ { @@ -140,7 +134,7 @@ func buildViamAPI() string { result += "\n" } - result += " }, this.config);\n" + + result += " }, merge({}, this.config, config));\n" + "};\n\n" } else { splits := strings.Split(url, "/") @@ -154,8 +148,8 @@ func buildViamAPI() string { methodStr := splits[len(splits)-1] - result += "ViamAPI.prototype." + packageStr + strings.Title(methodStr) + " = function() {\n" + - " return axios.post(window.API_HOST + '" + packageStr + "/" + methodStr + "', {}, this.config);\n" + + result += "ViamAPI.prototype." + packageStr + strings.Title(methodStr) + " = function(config, data) {\n" + + " return axios.post(window.API_HOST + '" + packageStr + "/" + methodStr + "', data, merge({}, this.config, config));\n" + "};\n\n" } } @@ -589,7 +583,7 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string { privateCheckSnippet := ` const authenticationPublicKey = localStorage.getItem("authenticatedIdentity"); - + if (authenticationPublicKey === null) { result({ "data" : "", @@ -597,15 +591,15 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string { "status" : "Identity not authenticated" }); } - + if (loadedIdentities[authenticationPublicKey] === null) { result({ "data" : "", "code" : "400", "status" : "Identity not authenticated" }); - } - + } + const success = extendPinCodeTtl(authenticationPublicKey); if(success === false) { @@ -614,7 +608,7 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string { "status" : "Identity not authenticated" }) } - + ` for i := 0; i < keysLen; i++ { @@ -627,7 +621,7 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string { if url == "/identity/getIdentityProfileData" { privateCheckSnippet = ` const authenticationPublicKey = localStorage.getItem("authenticatedIdentity"); - + if (authenticationPublicKey === null) { result({ "data" : "", @@ -635,15 +629,15 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string { "status" : "Identity not authenticated" }); } - + if (loadedIdentities[authenticationPublicKey] === null) { result({ "data" : "", "code" : "400", "status" : "Identity not authenticated" }); - } - + } + ` } @@ -652,11 +646,6 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string { packageStr := splits[len(splits)-2] - /*if !packageCreated[packageStr] { - result += "ViamAPI.prototype.\"" + packageStr + "\" = {}\n\n" - packageCreated[packageStr] = true - }*/ - methodStr := splits[len(splits)-1] form := endPoints[url].Form @@ -678,12 +667,6 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string { } } - /*identity_login(modeArg,codeArg,actionIDArg) { - return new Penpal.Promise(result => { - viamApi.identity_login(modeArg,codeArg,actionIDArg).then((response) => { result(response.data);}); - }); - }*/ - snippet := "" if endPoints[url].HandlerType == "private" { @@ -698,7 +681,7 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string { method := packageStr + strings.Title(methodStr) + ": function(" + args + ") {\n" + " return new Penpal.Promise(function(result) {\n" + snippet + - " executeRestfulFunction(\"" + endPoints[url].HandlerType + "\", viamApi, viamApi." + packageStr + strings.Title(methodStr) + lastComma + args + ").then(function(executeResult) {\n" + + " executeRestfulFunction(\"" + endPoints[url].HandlerType + "\", viamApi, viamApi." + packageStr + strings.Title(methodStr) + ", null" + lastComma + args + ").then(function(executeResult) {\n" + " result(executeResult);\n" + " });\n" + " });\n" + @@ -716,11 +699,6 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string { packageStr := splits[len(splits)-2] - /*if !packageCreated[packageStr] { - result += "ViamAPI.prototype.\"" + packageStr + "\" = {}\n\n" - packageCreated[packageStr] = true - }*/ - methodStr := splits[len(splits)-1] snippet := "" @@ -731,7 +709,7 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string { method := packageStr + strings.Title(methodStr) + ": function() {\n" + " return new Penpal.Promise(function(result) {\n" + snippet + - " executeRestfulFunction(\"" + endPoints[url].HandlerType + "\", viamApi, viamApi." + packageStr + strings.Title(methodStr) + ").then(function(executeResult) {\n" + + " executeRestfulFunction(\"" + endPoints[url].HandlerType + "\", viamApi, viamApi." + packageStr + strings.Title(methodStr) + ", null).then(function(executeResult) {\n" + " result(executeResult);\n" + " });\n" + " });\n" + @@ -750,39 +728,3 @@ func generatePenpalRemoteMethods(endPoints map[string]*server.EndPoint) string { return methods } - -func getWopiAPIPenpalMethods() string { - return `getPassports: function(fileID) { - return new Penpal.Promise(function(result) { - const authenticationPublicKey = localStorage.getItem("authenticatedIdentity"); - if (authenticationPublicKey === null) { - result({ - "data" : "", - "code" : "400", - "status" : "Identity not authenticated" - }); - } - - if (loadedIdentities[authenticationPublicKey] === null) { - result({ - "data" : "", - "code" : "400", - "status" : "Identity not authenticated" - }); - } - - const success = extendPinCodeTtl(authenticationPublicKey); - - if (success === false) { - result({"data" : "", - "code" : "400", - "status" : "Identity not authenticated" - }); - } - - wopiAPI.getPassports(fileID).then(function(response) { - result(response.data); - }); - }); - }` -}