diff --git a/uma-server-webapp/src/main/webapp/resources/js/policy.js b/uma-server-webapp/src/main/webapp/resources/js/policy.js
index c7d3af155..05fdcbdff 100644
--- a/uma-server-webapp/src/main/webapp/resources/js/policy.js
+++ b/uma-server-webapp/src/main/webapp/resources/js/policy.js
@@ -278,43 +278,13 @@ var PolicyListView = Backbone.View.extend({
app.navigate('user/policy', {trigger: true});
},
- addPolicy:function(e) {
- e.preventDefault();
-
- // post to the webfinger helper and get the response back
-
- var _self = this;
-
- var email = $('#email', this.el).val();
-
- var base = $('base').attr('href');
- $.getJSON(base + '/api/emailsearch?' + $.param({'identifier': email}), function(data) {
-
- var claim = new ClaimModel(data);
- _self.model.add(claim, {'trigger': false});
- _self.render();
-
- }).error(function(jqXHR, textStatus, errorThrown) {
- console.log("An error occurred when doing a webfinger lookup", errorThrown);
-
- //Display an alert with an error message
- $('#modalAlert div.modal-header').html($.t('policy.webfinger-error'));
- $('#modalAlert div.modal-body').html($.t('policy.webfinger-error-description', {email: email}));
-
- $("#modalAlert").modal({ // wire up the actual modal functionality and show the dialog
- "backdrop" : "static",
- "keyboard" : true,
- "show" : true // ensure the modal is shown immediately
- });
- });
-
- },
-
togglePlaceholder:function() {
if (this.model.length > 0) {
+ $('#policy-info', this.el).show();
$('#policy-table', this.el).show();
$('#policy-table-empty', this.el).hide();
} else {
+ $('#policy-info', this.el).hide();
$('#policy-table', this.el).hide();
$('#policy-table-empty', this.el).show();
}
@@ -432,7 +402,9 @@ var PolicyFormView = Backbone.View.extend({
},
events:{
- 'click .btn-save': 'savePolicy'
+ 'click .btn-share': 'addClaim',
+ 'click .btn-save': 'savePolicy',
+ 'click .btn-cancel': 'cancel'
},
load:function(callback) {
@@ -459,6 +431,40 @@ var PolicyFormView = Backbone.View.extend({
});
},
+ addClaim:function(e) {
+ e.preventDefault();
+
+ // post to the webfinger helper and get the response back
+
+ var _self = this;
+
+ var email = $('#email', this.el).val();
+
+ var base = $('base').attr('href');
+ $.getJSON(base + '/api/emailsearch?' + $.param({'identifier': email}), function(data) {
+
+ _self.model.set({
+ claimsRequired: data
+ }, {trigger: false});
+
+ _self.render();
+
+ }).error(function(jqXHR, textStatus, errorThrown) {
+ console.log("An error occurred when doing a webfinger lookup", errorThrown);
+
+ //Display an alert with an error message
+ $('#modalAlert div.modal-header').html($.t('policy.webfinger-error'));
+ $('#modalAlert div.modal-body').html($.t('policy.webfinger-error-description', {email: email}));
+
+ $("#modalAlert").modal({ // wire up the actual modal functionality and show the dialog
+ "backdrop" : "static",
+ "keyboard" : true,
+ "show" : true // ensure the modal is shown immediately
+ });
+ });
+
+ },
+
savePolicy:function(e) {
e.preventDefault();
@@ -499,6 +505,11 @@ var PolicyFormView = Backbone.View.extend({
},
+ cancel:function(e) {
+ e.preventDefault();
+ app.navigate('user/policy/' + this.options.rs.get('id'), {trigger: true});
+ },
+
render:function (eventName) {
var json = this.model.toJSON();
var rs = this.options.rs.toJSON();
diff --git a/uma-server-webapp/src/main/webapp/resources/template/policy.html b/uma-server-webapp/src/main/webapp/resources/template/policy.html
index 262d90bda..b792d9a21 100644
--- a/uma-server-webapp/src/main/webapp/resources/template/policy.html
+++ b/uma-server-webapp/src/main/webapp/resources/template/policy.html
@@ -60,7 +60,7 @@
-
+
|
@@ -69,10 +69,10 @@
@@ -129,7 +129,7 @@
-
+
|
@@ -153,7 +153,7 @@
diff --git a/uma-server/src/main/java/org/mitre/uma/web/PolicyAPI.java b/uma-server/src/main/java/org/mitre/uma/web/PolicyAPI.java
index 7896c1427..4f3cdcbf1 100644
--- a/uma-server/src/main/java/org/mitre/uma/web/PolicyAPI.java
+++ b/uma-server/src/main/java/org/mitre/uma/web/PolicyAPI.java
@@ -85,7 +85,7 @@ public class PolicyAPI {
}
/**
- * List all the policies for the given resource set
+ * Get the indicated resource set
* @param rsid
* @param m
* @param auth
@@ -114,6 +114,37 @@ public class PolicyAPI {
return JsonEntityView.VIEWNAME;
}
+ /**
+ * Delete the indicated resource set
+ * @param rsid
+ * @param m
+ * @param auth
+ * @return
+ */
+ @RequestMapping(value = "/{rsid}", method = RequestMethod.DELETE, produces = MimeTypeUtils.APPLICATION_JSON_VALUE)
+ public String deleteResourceSet(@PathVariable (value = "rsid") Long rsid, Model m, Authentication auth) {
+
+ ResourceSet rs = resourceSetService.getById(rsid);
+
+ if (rs == null) {
+ m.addAttribute(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
+ return HttpCodeView.VIEWNAME;
+ }
+
+ if (!rs.getOwner().equals(auth.getName())) {
+ logger.warn("Unauthorized resource set request from bad user; expected " + rs.getOwner() + " got " + auth.getName());
+
+ // authenticated user didn't match the owner of the resource set
+ m.addAttribute(HttpCodeView.CODE, HttpStatus.FORBIDDEN);
+ return HttpCodeView.VIEWNAME;
+ }
+
+ resourceSetService.remove(rs);
+ m.addAttribute(HttpCodeView.CODE, HttpStatus.NO_CONTENT);
+ return HttpCodeView.VIEWNAME;
+
+ }
+
/**
* List all the policies for the given resource set
* @param rsid
diff --git a/uma-server/src/main/java/org/mitre/uma/web/UserClaimSearchHelper.java b/uma-server/src/main/java/org/mitre/uma/web/UserClaimSearchHelper.java
index 41a3c7545..7221a5432 100644
--- a/uma-server/src/main/java/org/mitre/uma/web/UserClaimSearchHelper.java
+++ b/uma-server/src/main/java/org/mitre/uma/web/UserClaimSearchHelper.java
@@ -72,31 +72,46 @@ public class UserClaimSearchHelper {
UserInfo localUser = userInfoService.getByEmailAddress(email);
if (localUser != null) {
- Map entity = new HashMap<>();
- entity.put("issuer", ImmutableSet.of(config.getIssuer()));
- entity.put("name", "email");
- entity.put("value", localUser.getEmail());
-
- m.addAttribute(JsonEntityView.ENTITY, entity);
- return JsonEntityView.VIEWNAME;
- }
-
-
- // otherwise do a webfinger lookup
- IssuerServiceResponse resp = webfingerIssuerService.getIssuer(req);
-
- if (resp != null && resp.getIssuer() != null) {
- // we found an issuer, return that
- Map entity = new HashMap<>();
- entity.put("issuer", ImmutableSet.of(resp.getIssuer()));
- entity.put("name", "email");
- entity.put("value", email);
-
- m.addAttribute(JsonEntityView.ENTITY, entity);
+ Map e = new HashMap<>();
+ e.put("issuer", ImmutableSet.of(config.getIssuer()));
+ e.put("name", "email");
+ e.put("value", localUser.getEmail());
+
+ Map ev = new HashMap<>();
+ ev.put("issuer", ImmutableSet.of(config.getIssuer()));
+ ev.put("name", "email_verified");
+ ev.put("value", localUser.getEmailVerified());
+
+ Map s = new HashMap<>();
+ s.put("issuer", ImmutableSet.of(config.getIssuer()));
+ s.put("name", "sub");
+ s.put("value", localUser.getSub());
+
+ m.addAttribute(JsonEntityView.ENTITY, ImmutableSet.of(e, ev, s));
return JsonEntityView.VIEWNAME;
} else {
- m.addAttribute(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
- return JsonErrorView.VIEWNAME;
+
+ // otherwise do a webfinger lookup
+ IssuerServiceResponse resp = webfingerIssuerService.getIssuer(req);
+
+ if (resp != null && resp.getIssuer() != null) {
+ // we found an issuer, return that
+ Map e = new HashMap<>();
+ e.put("issuer", ImmutableSet.of(resp.getIssuer()));
+ e.put("name", "email");
+ e.put("value", email);
+
+ Map ev = new HashMap<>();
+ ev.put("issuer", ImmutableSet.of(resp.getIssuer()));
+ ev.put("name", "email_verified");
+ ev.put("value", true);
+
+ m.addAttribute(JsonEntityView.ENTITY, ImmutableSet.of(e, ev));
+ return JsonEntityView.VIEWNAME;
+ } else {
+ m.addAttribute(HttpCodeView.CODE, HttpStatus.NOT_FOUND);
+ return JsonErrorView.VIEWNAME;
+ }
}
}