jiti-meet/react/features/authentication/middleware.web.js

151 lines
4.2 KiB
JavaScript
Raw Normal View History

2017-10-04 22:36:09 +00:00
// @flow
import { maybeRedirectToWelcomePage } from '../app/actions';
2017-09-18 07:09:43 +00:00
import {
CONFERENCE_FAILED,
CONFERENCE_JOINED,
CONFERENCE_LEFT
} from '../base/conference';
import { CONNECTION_ESTABLISHED } from '../base/connection';
2017-09-18 07:09:43 +00:00
import { hideDialog, isDialogOpen } from '../base/dialog';
import {
JitsiConferenceErrors
2017-09-18 07:09:43 +00:00
} from '../base/lib-jitsi-meet';
2017-09-08 13:36:42 +00:00
import { MiddlewareRegistry } from '../base/redux';
2020-05-20 10:57:03 +00:00
import {
CANCEL_LOGIN,
STOP_WAIT_FOR_OWNER,
UPGRADE_ROLE_FINISHED,
2020-05-20 10:57:03 +00:00
WAIT_FOR_OWNER
} from './actionTypes';
2017-09-08 13:36:42 +00:00
import {
hideLoginDialog,
openWaitForOwnerDialog,
stopWaitForOwner
} from './actions.web';
2017-09-18 07:09:43 +00:00
import { LoginDialog, WaitForOwnerDialog } from './components';
2017-09-08 13:36:42 +00:00
/**
2017-09-18 07:09:43 +00:00
* Middleware that captures connection or conference failed errors and controls
2017-09-08 13:36:42 +00:00
* {@link WaitForOwnerDialog} and {@link LoginDialog}.
*
* FIXME Some of the complexity was introduced by the lack of dialog stacking.
*
* @param {Store} store - Redux store.
* @returns {Function}
*/
MiddlewareRegistry.register(store => next => action => {
switch (action.type) {
2017-09-18 07:09:43 +00:00
case CANCEL_LOGIN: {
const { dispatch, getState } = store;
2017-09-18 07:09:43 +00:00
if (!isDialogOpen(store, WaitForOwnerDialog)) {
if (_isWaitingForOwner(store)) {
dispatch(openWaitForOwnerDialog());
2017-09-18 07:09:43 +00:00
return next(action);
2017-09-18 07:09:43 +00:00
}
dispatch(hideLoginDialog());
const { authRequired, conference } = getState()['features/base/conference'];
// Only end the meeting if we are not already inside and trying to upgrade.
if (authRequired && !conference) {
dispatch(maybeRedirectToWelcomePage());
}
2017-09-08 13:36:42 +00:00
}
break;
}
2017-09-18 07:09:43 +00:00
case CONFERENCE_FAILED: {
const { error } = action;
let recoverable;
if (error.name === JitsiConferenceErrors.AUTHENTICATION_REQUIRED) {
if (typeof error.recoverable === 'undefined') {
error.recoverable = true;
}
recoverable = error.recoverable;
}
if (recoverable) {
// we haven't migrated all the code from AuthHandler, and we need for now conference.js to trigger
// the dialog to pass all required parameters to WaitForOwnerDialog
// keep it commented, so we do not trigger sending iqs to jicofo twice
// and showing the broken dialog with no handler
// store.dispatch(waitForOwner());
2017-09-08 13:36:42 +00:00
} else {
2017-09-18 07:09:43 +00:00
store.dispatch(stopWaitForOwner());
2017-09-08 13:36:42 +00:00
}
break;
}
2017-09-18 07:09:43 +00:00
case CONFERENCE_JOINED:
store.dispatch(stopWaitForOwner());
store.dispatch(hideLoginDialog());
2017-09-08 13:36:42 +00:00
break;
2017-09-18 07:09:43 +00:00
case CONFERENCE_LEFT:
store.dispatch(stopWaitForOwner());
break;
2017-09-08 13:36:42 +00:00
2017-09-18 07:09:43 +00:00
case CONNECTION_ESTABLISHED:
store.dispatch(hideLoginDialog());
2017-09-08 13:36:42 +00:00
break;
2017-09-18 07:09:43 +00:00
case STOP_WAIT_FOR_OWNER:
_clearExistingWaitForOwnerTimeout(store);
2017-09-18 07:09:43 +00:00
store.dispatch(hideDialog(WaitForOwnerDialog));
break;
2017-09-08 13:36:42 +00:00
case UPGRADE_ROLE_FINISHED: {
const { error, progress } = action;
if (!error && progress === 1) {
store.dispatch(hideLoginDialog());
}
break;
}
2017-09-18 07:09:43 +00:00
case WAIT_FOR_OWNER: {
_clearExistingWaitForOwnerTimeout(store);
2017-09-08 13:36:42 +00:00
2017-09-18 07:09:43 +00:00
const { handler, timeoutMs } = action;
2017-09-08 13:36:42 +00:00
2017-09-18 07:09:43 +00:00
action.waitForOwnerTimeoutID = setTimeout(handler, timeoutMs);
2017-09-08 13:36:42 +00:00
2017-09-18 07:09:43 +00:00
isDialogOpen(store, LoginDialog)
|| store.dispatch(openWaitForOwnerDialog());
2017-09-08 13:36:42 +00:00
break;
}
}
return next(action);
});
2017-09-18 07:09:43 +00:00
/**
* Will clear the wait for conference owner timeout handler if any is currently
* set.
*
* @param {Object} store - The redux store.
* @returns {void}
*/
function _clearExistingWaitForOwnerTimeout(
2017-10-04 22:36:09 +00:00
{ getState }: { getState: Function }) {
2017-09-18 07:09:43 +00:00
const { waitForOwnerTimeoutID } = getState()['features/authentication'];
waitForOwnerTimeoutID && clearTimeout(waitForOwnerTimeoutID);
}
/**
* Checks if the cyclic "wait for conference owner" task is currently scheduled.
*
* @param {Object} store - The redux store.
* @returns {void}
2017-09-18 07:09:43 +00:00
*/
function _isWaitingForOwner({ getState }: { getState: Function }) {
return getState()['features/authentication'].waitForOwnerTimeoutID;
2017-09-18 07:09:43 +00:00
}