Commit 864a98fd8b1f95e7b22d765ff357504357aedb6e

Authored by Andrii Shvaika
2 parents 71f94358 d9bfd829

Merge branch 'master' of github.com:thingsboard/thingsboard

Showing 23 changed files with 240 additions and 127 deletions
@@ -5,7 +5,7 @@ @@ -5,7 +5,7 @@
5 "94715984-ae74-76e4-20b7-2f956b01ed80": { 5 "94715984-ae74-76e4-20b7-2f956b01ed80": {
6 "isSystemType": true, 6 "isSystemType": true,
7 "bundleAlias": "entity_admin_widgets", 7 "bundleAlias": "entity_admin_widgets",
8 - "typeAlias": "device_admin_table2", 8 + "typeAlias": "device_admin_table",
9 "type": "latest", 9 "type": "latest",
10 "title": "New widget", 10 "title": "New widget",
11 "sizeX": 24, 11 "sizeX": 24,
@@ -1271,4 +1271,4 @@ @@ -1271,4 +1271,4 @@
1271 } 1271 }
1272 }, 1272 },
1273 "name": "Gateways" 1273 "name": "Gateways"
1274 -}  
  1274 +}
@@ -6,7 +6,7 @@ @@ -6,7 +6,7 @@
6 }, 6 },
7 "widgetTypes": [ 7 "widgetTypes": [
8 { 8 {
9 - "alias": "device_admin_table2", 9 + "alias": "device_admin_table",
10 "name": "Device admin table", 10 "name": "Device admin table",
11 "descriptor": { 11 "descriptor": {
12 "type": "latest", 12 "type": "latest",
@@ -22,7 +22,7 @@ @@ -22,7 +22,7 @@
22 } 22 }
23 }, 23 },
24 { 24 {
25 - "alias": "device_admin_table", 25 + "alias": "asset_admin_table",
26 "name": "Asset admin table", 26 "name": "Asset admin table",
27 "descriptor": { 27 "descriptor": {
28 "type": "latest", 28 "type": "latest",
@@ -79,11 +79,18 @@ public class ThingsboardSecurityConfiguration extends WebSecurityConfigurerAdapt @@ -79,11 +79,18 @@ public class ThingsboardSecurityConfiguration extends WebSecurityConfigurerAdapt
79 @Qualifier("oauth2AuthenticationSuccessHandler") 79 @Qualifier("oauth2AuthenticationSuccessHandler")
80 private AuthenticationSuccessHandler oauth2AuthenticationSuccessHandler; 80 private AuthenticationSuccessHandler oauth2AuthenticationSuccessHandler;
81 81
  82 + @Autowired(required = false)
  83 + @Qualifier("oauth2AuthenticationFailureHandler")
  84 + private AuthenticationFailureHandler oauth2AuthenticationFailureHandler;
  85 +
82 @Autowired 86 @Autowired
83 @Qualifier("defaultAuthenticationSuccessHandler") 87 @Qualifier("defaultAuthenticationSuccessHandler")
84 private AuthenticationSuccessHandler successHandler; 88 private AuthenticationSuccessHandler successHandler;
85 89
86 - @Autowired private AuthenticationFailureHandler failureHandler; 90 + @Autowired
  91 + @Qualifier("defaultAuthenticationFailureHandler")
  92 + private AuthenticationFailureHandler failureHandler;
  93 +
87 @Autowired private RestAuthenticationProvider restAuthenticationProvider; 94 @Autowired private RestAuthenticationProvider restAuthenticationProvider;
88 @Autowired private JwtAuthenticationProvider jwtAuthenticationProvider; 95 @Autowired private JwtAuthenticationProvider jwtAuthenticationProvider;
89 @Autowired private RefreshTokenAuthenticationProvider refreshTokenAuthenticationProvider; 96 @Autowired private RefreshTokenAuthenticationProvider refreshTokenAuthenticationProvider;
@@ -204,11 +211,11 @@ public class ThingsboardSecurityConfiguration extends WebSecurityConfigurerAdapt @@ -204,11 +211,11 @@ public class ThingsboardSecurityConfiguration extends WebSecurityConfigurerAdapt
204 http.oauth2Login() 211 http.oauth2Login()
205 .loginPage("/oauth2Login") 212 .loginPage("/oauth2Login")
206 .loginProcessingUrl(oauth2Configuration.getLoginProcessingUrl()) 213 .loginProcessingUrl(oauth2Configuration.getLoginProcessingUrl())
207 - .successHandler(oauth2AuthenticationSuccessHandler); 214 + .successHandler(oauth2AuthenticationSuccessHandler)
  215 + .failureHandler(oauth2AuthenticationFailureHandler);
208 } 216 }
209 } 217 }
210 218
211 -  
212 @Bean 219 @Bean
213 @ConditionalOnMissingBean(CorsFilter.class) 220 @ConditionalOnMissingBean(CorsFilter.class)
214 public CorsFilter corsFilter(@Autowired MvcCorsProperties mvcCorsProperties) { 221 public CorsFilter corsFilter(@Autowired MvcCorsProperties mvcCorsProperties) {
@@ -52,6 +52,7 @@ import org.thingsboard.server.service.security.model.UserPrincipal; @@ -52,6 +52,7 @@ import org.thingsboard.server.service.security.model.UserPrincipal;
52 import org.thingsboard.server.service.security.model.token.JwtToken; 52 import org.thingsboard.server.service.security.model.token.JwtToken;
53 import org.thingsboard.server.service.security.model.token.JwtTokenFactory; 53 import org.thingsboard.server.service.security.model.token.JwtTokenFactory;
54 import org.thingsboard.server.service.security.system.SystemSecurityService; 54 import org.thingsboard.server.service.security.system.SystemSecurityService;
  55 +import org.thingsboard.server.utils.MiscUtils;
55 import ua_parser.Client; 56 import ua_parser.Client;
56 57
57 import javax.servlet.http.HttpServletRequest; 58 import javax.servlet.http.HttpServletRequest;
@@ -170,7 +171,7 @@ public class AuthController extends BaseController { @@ -170,7 +171,7 @@ public class AuthController extends BaseController {
170 try { 171 try {
171 String email = resetPasswordByEmailRequest.get("email").asText(); 172 String email = resetPasswordByEmailRequest.get("email").asText();
172 UserCredentials userCredentials = userService.requestPasswordReset(TenantId.SYS_TENANT_ID, email); 173 UserCredentials userCredentials = userService.requestPasswordReset(TenantId.SYS_TENANT_ID, email);
173 - String baseUrl = constructBaseUrl(request); 174 + String baseUrl = MiscUtils.constructBaseUrl(request);
174 String resetUrl = String.format("%s/api/noauth/resetPassword?resetToken=%s", baseUrl, 175 String resetUrl = String.format("%s/api/noauth/resetPassword?resetToken=%s", baseUrl,
175 userCredentials.getResetToken()); 176 userCredentials.getResetToken());
176 177
@@ -218,7 +219,7 @@ public class AuthController extends BaseController { @@ -218,7 +219,7 @@ public class AuthController extends BaseController {
218 User user = userService.findUserById(TenantId.SYS_TENANT_ID, credentials.getUserId()); 219 User user = userService.findUserById(TenantId.SYS_TENANT_ID, credentials.getUserId());
219 UserPrincipal principal = new UserPrincipal(UserPrincipal.Type.USER_NAME, user.getEmail()); 220 UserPrincipal principal = new UserPrincipal(UserPrincipal.Type.USER_NAME, user.getEmail());
220 SecurityUser securityUser = new SecurityUser(user, credentials.isEnabled(), principal); 221 SecurityUser securityUser = new SecurityUser(user, credentials.isEnabled(), principal);
221 - String baseUrl = constructBaseUrl(request); 222 + String baseUrl = MiscUtils.constructBaseUrl(request);
222 String loginUrl = String.format("%s/login", baseUrl); 223 String loginUrl = String.format("%s/login", baseUrl);
223 String email = user.getEmail(); 224 String email = user.getEmail();
224 225
@@ -265,7 +266,7 @@ public class AuthController extends BaseController { @@ -265,7 +266,7 @@ public class AuthController extends BaseController {
265 User user = userService.findUserById(TenantId.SYS_TENANT_ID, userCredentials.getUserId()); 266 User user = userService.findUserById(TenantId.SYS_TENANT_ID, userCredentials.getUserId());
266 UserPrincipal principal = new UserPrincipal(UserPrincipal.Type.USER_NAME, user.getEmail()); 267 UserPrincipal principal = new UserPrincipal(UserPrincipal.Type.USER_NAME, user.getEmail());
267 SecurityUser securityUser = new SecurityUser(user, userCredentials.isEnabled(), principal); 268 SecurityUser securityUser = new SecurityUser(user, userCredentials.isEnabled(), principal);
268 - String baseUrl = constructBaseUrl(request); 269 + String baseUrl = MiscUtils.constructBaseUrl(request);
269 String loginUrl = String.format("%s/login", baseUrl); 270 String loginUrl = String.format("%s/login", baseUrl);
270 String email = user.getEmail(); 271 String email = user.getEmail();
271 mailService.sendPasswordWasResetEmail(loginUrl, email); 272 mailService.sendPasswordWasResetEmail(loginUrl, email);
@@ -521,39 +521,6 @@ public abstract class BaseController { @@ -521,39 +521,6 @@ public abstract class BaseController {
521 return ruleNode; 521 return ruleNode;
522 } 522 }
523 523
524 -  
525 - protected String constructBaseUrl(HttpServletRequest request) {  
526 - String scheme = request.getScheme();  
527 -  
528 - String forwardedProto = request.getHeader("x-forwarded-proto");  
529 - if (forwardedProto != null) {  
530 - scheme = forwardedProto;  
531 - }  
532 -  
533 - int serverPort = request.getServerPort();  
534 - if (request.getHeader("x-forwarded-port") != null) {  
535 - try {  
536 - serverPort = request.getIntHeader("x-forwarded-port");  
537 - } catch (NumberFormatException e) {  
538 - }  
539 - } else if (forwardedProto != null) {  
540 - switch (forwardedProto) {  
541 - case "http":  
542 - serverPort = 80;  
543 - break;  
544 - case "https":  
545 - serverPort = 443;  
546 - break;  
547 - }  
548 - }  
549 -  
550 - String baseUrl = String.format("%s://%s:%d",  
551 - scheme,  
552 - request.getServerName(),  
553 - serverPort);  
554 - return baseUrl;  
555 - }  
556 -  
557 protected <I extends EntityId> I emptyId(EntityType entityType) { 524 protected <I extends EntityId> I emptyId(EntityType entityType) {
558 return (I) EntityIdFactory.getByTypeAndUuid(entityType, ModelConstants.NULL_UUID); 525 return (I) EntityIdFactory.getByTypeAndUuid(entityType, ModelConstants.NULL_UUID);
559 } 526 }
@@ -52,6 +52,7 @@ import org.thingsboard.server.service.security.model.token.JwtToken; @@ -52,6 +52,7 @@ import org.thingsboard.server.service.security.model.token.JwtToken;
52 import org.thingsboard.server.service.security.model.token.JwtTokenFactory; 52 import org.thingsboard.server.service.security.model.token.JwtTokenFactory;
53 import org.thingsboard.server.service.security.permission.Operation; 53 import org.thingsboard.server.service.security.permission.Operation;
54 import org.thingsboard.server.service.security.permission.Resource; 54 import org.thingsboard.server.service.security.permission.Resource;
  55 +import org.thingsboard.server.utils.MiscUtils;
55 56
56 import javax.servlet.http.HttpServletRequest; 57 import javax.servlet.http.HttpServletRequest;
57 58
@@ -148,7 +149,7 @@ public class UserController extends BaseController { @@ -148,7 +149,7 @@ public class UserController extends BaseController {
148 if (sendEmail) { 149 if (sendEmail) {
149 SecurityUser authUser = getCurrentUser(); 150 SecurityUser authUser = getCurrentUser();
150 UserCredentials userCredentials = userService.findUserCredentialsByUserId(authUser.getTenantId(), savedUser.getId()); 151 UserCredentials userCredentials = userService.findUserCredentialsByUserId(authUser.getTenantId(), savedUser.getId());
151 - String baseUrl = constructBaseUrl(request); 152 + String baseUrl = MiscUtils.constructBaseUrl(request);
152 String activateUrl = String.format(ACTIVATE_URL_PATTERN, baseUrl, 153 String activateUrl = String.format(ACTIVATE_URL_PATTERN, baseUrl,
153 userCredentials.getActivateToken()); 154 userCredentials.getActivateToken());
154 String email = savedUser.getEmail(); 155 String email = savedUser.getEmail();
@@ -188,7 +189,7 @@ public class UserController extends BaseController { @@ -188,7 +189,7 @@ public class UserController extends BaseController {
188 189
189 UserCredentials userCredentials = userService.findUserCredentialsByUserId(getCurrentUser().getTenantId(), user.getId()); 190 UserCredentials userCredentials = userService.findUserCredentialsByUserId(getCurrentUser().getTenantId(), user.getId());
190 if (!userCredentials.isEnabled()) { 191 if (!userCredentials.isEnabled()) {
191 - String baseUrl = constructBaseUrl(request); 192 + String baseUrl = MiscUtils.constructBaseUrl(request);
192 String activateUrl = String.format(ACTIVATE_URL_PATTERN, baseUrl, 193 String activateUrl = String.format(ACTIVATE_URL_PATTERN, baseUrl,
193 userCredentials.getActivateToken()); 194 userCredentials.getActivateToken());
194 mailService.sendActivationEmail(activateUrl, email); 195 mailService.sendActivationEmail(activateUrl, email);
@@ -213,7 +214,7 @@ public class UserController extends BaseController { @@ -213,7 +214,7 @@ public class UserController extends BaseController {
213 SecurityUser authUser = getCurrentUser(); 214 SecurityUser authUser = getCurrentUser();
214 UserCredentials userCredentials = userService.findUserCredentialsByUserId(authUser.getTenantId(), user.getId()); 215 UserCredentials userCredentials = userService.findUserCredentialsByUserId(authUser.getTenantId(), user.getId());
215 if (!userCredentials.isEnabled()) { 216 if (!userCredentials.isEnabled()) {
216 - String baseUrl = constructBaseUrl(request); 217 + String baseUrl = MiscUtils.constructBaseUrl(request);
217 String activateUrl = String.format(ACTIVATE_URL_PATTERN, baseUrl, 218 String activateUrl = String.format(ACTIVATE_URL_PATTERN, baseUrl,
218 userCredentials.getActivateToken()); 219 userCredentials.getActivateToken());
219 return activateUrl; 220 return activateUrl;
@@ -19,6 +19,7 @@ import lombok.extern.slf4j.Slf4j; @@ -19,6 +19,7 @@ import lombok.extern.slf4j.Slf4j;
19 import org.springframework.beans.factory.annotation.Autowired; 19 import org.springframework.beans.factory.annotation.Autowired;
20 import org.springframework.security.authentication.UsernamePasswordAuthenticationToken; 20 import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
21 import org.springframework.security.core.userdetails.UsernameNotFoundException; 21 import org.springframework.security.core.userdetails.UsernameNotFoundException;
  22 +import org.springframework.security.crypto.bcrypt.BCryptPasswordEncoder;
22 import org.springframework.util.StringUtils; 23 import org.springframework.util.StringUtils;
23 import org.thingsboard.server.common.data.Customer; 24 import org.thingsboard.server.common.data.Customer;
24 import org.thingsboard.server.common.data.Tenant; 25 import org.thingsboard.server.common.data.Tenant;
@@ -27,13 +28,16 @@ import org.thingsboard.server.common.data.id.CustomerId; @@ -27,13 +28,16 @@ import org.thingsboard.server.common.data.id.CustomerId;
27 import org.thingsboard.server.common.data.id.TenantId; 28 import org.thingsboard.server.common.data.id.TenantId;
28 import org.thingsboard.server.common.data.page.TextPageLink; 29 import org.thingsboard.server.common.data.page.TextPageLink;
29 import org.thingsboard.server.common.data.security.Authority; 30 import org.thingsboard.server.common.data.security.Authority;
  31 +import org.thingsboard.server.common.data.security.UserCredentials;
30 import org.thingsboard.server.dao.customer.CustomerService; 32 import org.thingsboard.server.dao.customer.CustomerService;
31 import org.thingsboard.server.dao.oauth2.OAuth2User; 33 import org.thingsboard.server.dao.oauth2.OAuth2User;
32 import org.thingsboard.server.dao.tenant.TenantService; 34 import org.thingsboard.server.dao.tenant.TenantService;
33 import org.thingsboard.server.dao.user.UserService; 35 import org.thingsboard.server.dao.user.UserService;
  36 +import org.thingsboard.server.service.install.InstallScripts;
34 import org.thingsboard.server.service.security.model.SecurityUser; 37 import org.thingsboard.server.service.security.model.SecurityUser;
35 import org.thingsboard.server.service.security.model.UserPrincipal; 38 import org.thingsboard.server.service.security.model.UserPrincipal;
36 39
  40 +import java.io.IOException;
37 import java.util.List; 41 import java.util.List;
38 import java.util.Optional; 42 import java.util.Optional;
39 import java.util.concurrent.locks.Lock; 43 import java.util.concurrent.locks.Lock;
@@ -46,14 +50,20 @@ public abstract class AbstractOAuth2ClientMapper { @@ -46,14 +50,20 @@ public abstract class AbstractOAuth2ClientMapper {
46 private UserService userService; 50 private UserService userService;
47 51
48 @Autowired 52 @Autowired
  53 + private BCryptPasswordEncoder passwordEncoder;
  54 +
  55 + @Autowired
49 private TenantService tenantService; 56 private TenantService tenantService;
50 57
51 @Autowired 58 @Autowired
52 private CustomerService customerService; 59 private CustomerService customerService;
53 60
  61 + @Autowired
  62 + private InstallScripts installScripts;
  63 +
54 private final Lock userCreationLock = new ReentrantLock(); 64 private final Lock userCreationLock = new ReentrantLock();
55 65
56 - protected SecurityUser getOrCreateSecurityUserFromOAuth2User(OAuth2User oauth2User, boolean allowUserCreation) { 66 + protected SecurityUser getOrCreateSecurityUserFromOAuth2User(OAuth2User oauth2User, boolean allowUserCreation, boolean activateUser) {
57 UserPrincipal principal = new UserPrincipal(UserPrincipal.Type.USER_NAME, oauth2User.getEmail()); 67 UserPrincipal principal = new UserPrincipal(UserPrincipal.Type.USER_NAME, oauth2User.getEmail());
58 68
59 User user = userService.findUserByEmail(TenantId.SYS_TENANT_ID, oauth2User.getEmail()); 69 User user = userService.findUserByEmail(TenantId.SYS_TENANT_ID, oauth2User.getEmail());
@@ -83,7 +93,14 @@ public abstract class AbstractOAuth2ClientMapper { @@ -83,7 +93,14 @@ public abstract class AbstractOAuth2ClientMapper {
83 user.setFirstName(oauth2User.getFirstName()); 93 user.setFirstName(oauth2User.getFirstName());
84 user.setLastName(oauth2User.getLastName()); 94 user.setLastName(oauth2User.getLastName());
85 user = userService.saveUser(user); 95 user = userService.saveUser(user);
  96 + if (activateUser) {
  97 + UserCredentials userCredentials = userService.findUserCredentialsByUserId(user.getTenantId(), user.getId());
  98 + userService.activateUserCredentials(user.getTenantId(), userCredentials.getActivateToken(), passwordEncoder.encode(""));
  99 + }
86 } 100 }
  101 + } catch (Exception e) {
  102 + log.error("Can't get or create security user from oauth2 user", e);
  103 + throw new RuntimeException("Can't get or create security user from oauth2 user", e);
87 } finally { 104 } finally {
88 userCreationLock.unlock(); 105 userCreationLock.unlock();
89 } 106 }
@@ -98,13 +115,14 @@ public abstract class AbstractOAuth2ClientMapper { @@ -98,13 +115,14 @@ public abstract class AbstractOAuth2ClientMapper {
98 } 115 }
99 } 116 }
100 117
101 - private TenantId getTenantId(String tenantName) { 118 + private TenantId getTenantId(String tenantName) throws IOException {
102 List<Tenant> tenants = tenantService.findTenants(new TextPageLink(1, tenantName)).getData(); 119 List<Tenant> tenants = tenantService.findTenants(new TextPageLink(1, tenantName)).getData();
103 Tenant tenant; 120 Tenant tenant;
104 if (tenants == null || tenants.isEmpty()) { 121 if (tenants == null || tenants.isEmpty()) {
105 tenant = new Tenant(); 122 tenant = new Tenant();
106 tenant.setTitle(tenantName); 123 tenant.setTitle(tenantName);
107 tenant = tenantService.saveTenant(tenant); 124 tenant = tenantService.saveTenant(tenant);
  125 + installScripts.createDefaultRuleChains(tenant.getId());
108 } else { 126 } else {
109 tenant = tenants.get(0); 127 tenant = tenants.get(0);
110 } 128 }
@@ -56,7 +56,8 @@ public class BasicOAuth2ClientMapper extends AbstractOAuth2ClientMapper implemen @@ -56,7 +56,8 @@ public class BasicOAuth2ClientMapper extends AbstractOAuth2ClientMapper implemen
56 String customerName = sub.replace(config.getBasic().getCustomerNamePattern()); 56 String customerName = sub.replace(config.getBasic().getCustomerNamePattern());
57 oauth2User.setCustomerName(customerName); 57 oauth2User.setCustomerName(customerName);
58 } 58 }
59 - return getOrCreateSecurityUserFromOAuth2User(oauth2User, config.getBasic().isAllowUserCreation()); 59 +
  60 + return getOrCreateSecurityUserFromOAuth2User(oauth2User, config.isAllowUserCreation(), config.isActivateUser());
60 } 61 }
61 62
62 private String getTenantName(Map<String, Object> attributes, OAuth2ClientMapperConfig config) { 63 private String getTenantName(Map<String, Object> attributes, OAuth2ClientMapperConfig config) {
@@ -38,7 +38,7 @@ public class CustomOAuth2ClientMapper extends AbstractOAuth2ClientMapper impleme @@ -38,7 +38,7 @@ public class CustomOAuth2ClientMapper extends AbstractOAuth2ClientMapper impleme
38 @Override 38 @Override
39 public SecurityUser getOrCreateUserByClientPrincipal(OAuth2AuthenticationToken token, OAuth2ClientMapperConfig config) { 39 public SecurityUser getOrCreateUserByClientPrincipal(OAuth2AuthenticationToken token, OAuth2ClientMapperConfig config) {
40 OAuth2User oauth2User = getOAuth2User(token, config.getCustom()); 40 OAuth2User oauth2User = getOAuth2User(token, config.getCustom());
41 - return getOrCreateSecurityUserFromOAuth2User(oauth2User, config.getBasic().isAllowUserCreation()); 41 + return getOrCreateSecurityUserFromOAuth2User(oauth2User, config.isAllowUserCreation(), config.isActivateUser());
42 } 42 }
43 43
44 private synchronized OAuth2User getOAuth2User(OAuth2AuthenticationToken token, OAuth2ClientMapperConfig.CustomOAuth2ClientMapperConfig custom) { 44 private synchronized OAuth2User getOAuth2User(OAuth2AuthenticationToken token, OAuth2ClientMapperConfig.CustomOAuth2ClientMapperConfig custom) {
  1 +/**
  2 + * Copyright © 2016-2020 The Thingsboard Authors
  3 + *
  4 + * Licensed under the Apache License, Version 2.0 (the "License");
  5 + * you may not use this file except in compliance with the License.
  6 + * You may obtain a copy of the License at
  7 + *
  8 + * http://www.apache.org/licenses/LICENSE-2.0
  9 + *
  10 + * Unless required by applicable law or agreed to in writing, software
  11 + * distributed under the License is distributed on an "AS IS" BASIS,
  12 + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13 + * See the License for the specific language governing permissions and
  14 + * limitations under the License.
  15 + */
  16 +package org.thingsboard.server.service.security.auth.oauth2;
  17 +
  18 +import org.springframework.boot.autoconfigure.condition.ConditionalOnProperty;
  19 +import org.springframework.security.core.AuthenticationException;
  20 +import org.springframework.security.web.authentication.SimpleUrlAuthenticationFailureHandler;
  21 +import org.springframework.stereotype.Component;
  22 +import org.thingsboard.server.utils.MiscUtils;
  23 +
  24 +import javax.servlet.ServletException;
  25 +import javax.servlet.http.HttpServletRequest;
  26 +import javax.servlet.http.HttpServletResponse;
  27 +import java.io.IOException;
  28 +import java.net.URLEncoder;
  29 +import java.nio.charset.StandardCharsets;
  30 +
  31 +@Component(value = "oauth2AuthenticationFailureHandler")
  32 +@ConditionalOnProperty(prefix = "security.oauth2", value = "enabled", havingValue = "true")
  33 +public class Oauth2AuthenticationFailureHandler extends SimpleUrlAuthenticationFailureHandler {
  34 +
  35 + @Override
  36 + public void onAuthenticationFailure(HttpServletRequest request,
  37 + HttpServletResponse response, AuthenticationException exception)
  38 + throws IOException, ServletException {
  39 + String baseUrl = MiscUtils.constructBaseUrl(request);
  40 + getRedirectStrategy().sendRedirect(request, response, baseUrl + "/login?loginError=" +
  41 + URLEncoder.encode(exception.getMessage(), StandardCharsets.UTF_8.toString()));
  42 + }
  43 +}
@@ -27,6 +27,7 @@ import org.thingsboard.server.service.security.auth.jwt.RefreshTokenRepository; @@ -27,6 +27,7 @@ import org.thingsboard.server.service.security.auth.jwt.RefreshTokenRepository;
27 import org.thingsboard.server.service.security.model.SecurityUser; 27 import org.thingsboard.server.service.security.model.SecurityUser;
28 import org.thingsboard.server.service.security.model.token.JwtToken; 28 import org.thingsboard.server.service.security.model.token.JwtToken;
29 import org.thingsboard.server.service.security.model.token.JwtTokenFactory; 29 import org.thingsboard.server.service.security.model.token.JwtTokenFactory;
  30 +import org.thingsboard.server.utils.MiscUtils;
30 31
31 import javax.servlet.http.HttpServletRequest; 32 import javax.servlet.http.HttpServletRequest;
32 import javax.servlet.http.HttpServletResponse; 33 import javax.servlet.http.HttpServletResponse;
@@ -65,6 +66,7 @@ public class Oauth2AuthenticationSuccessHandler extends SimpleUrlAuthenticationS @@ -65,6 +66,7 @@ public class Oauth2AuthenticationSuccessHandler extends SimpleUrlAuthenticationS
65 JwtToken accessToken = tokenFactory.createAccessJwtToken(securityUser); 66 JwtToken accessToken = tokenFactory.createAccessJwtToken(securityUser);
66 JwtToken refreshToken = refreshTokenRepository.requestRefreshToken(securityUser); 67 JwtToken refreshToken = refreshTokenRepository.requestRefreshToken(securityUser);
67 68
68 - getRedirectStrategy().sendRedirect(request, response, "/?accessToken=" + accessToken.getToken() + "&refreshToken=" + refreshToken.getToken()); 69 + String baseUrl = MiscUtils.constructBaseUrl(request);
  70 + getRedirectStrategy().sendRedirect(request, response, baseUrl + "/?accessToken=" + accessToken.getToken() + "&refreshToken=" + refreshToken.getToken());
69 } 71 }
70 } 72 }
@@ -26,7 +26,7 @@ import javax.servlet.http.HttpServletRequest; @@ -26,7 +26,7 @@ import javax.servlet.http.HttpServletRequest;
26 import javax.servlet.http.HttpServletResponse; 26 import javax.servlet.http.HttpServletResponse;
27 import java.io.IOException; 27 import java.io.IOException;
28 28
29 -@Component 29 +@Component(value = "defaultAuthenticationFailureHandler")
30 public class RestAwareAuthenticationFailureHandler implements AuthenticationFailureHandler { 30 public class RestAwareAuthenticationFailureHandler implements AuthenticationFailureHandler {
31 31
32 private final ThingsboardErrorResponseHandler errorResponseHandler; 32 private final ThingsboardErrorResponseHandler errorResponseHandler;
@@ -18,8 +18,8 @@ package org.thingsboard.server.utils; @@ -18,8 +18,8 @@ package org.thingsboard.server.utils;
18 import com.google.common.hash.HashFunction; 18 import com.google.common.hash.HashFunction;
19 import com.google.common.hash.Hashing; 19 import com.google.common.hash.Hashing;
20 20
  21 +import javax.servlet.http.HttpServletRequest;
21 import java.nio.charset.Charset; 22 import java.nio.charset.Charset;
22 -import java.util.Random;  
23 23
24 24
25 /** 25 /**
@@ -47,4 +47,36 @@ public class MiscUtils { @@ -47,4 +47,36 @@ public class MiscUtils {
47 throw new IllegalArgumentException("Can't find hash function with name " + name); 47 throw new IllegalArgumentException("Can't find hash function with name " + name);
48 } 48 }
49 } 49 }
  50 +
  51 + public static String constructBaseUrl(HttpServletRequest request) {
  52 + String scheme = request.getScheme();
  53 +
  54 + String forwardedProto = request.getHeader("x-forwarded-proto");
  55 + if (forwardedProto != null) {
  56 + scheme = forwardedProto;
  57 + }
  58 +
  59 + int serverPort = request.getServerPort();
  60 + if (request.getHeader("x-forwarded-port") != null) {
  61 + try {
  62 + serverPort = request.getIntHeader("x-forwarded-port");
  63 + } catch (NumberFormatException e) {
  64 + }
  65 + } else if (forwardedProto != null) {
  66 + switch (forwardedProto) {
  67 + case "http":
  68 + serverPort = 80;
  69 + break;
  70 + case "https":
  71 + serverPort = 443;
  72 + break;
  73 + }
  74 + }
  75 +
  76 + String baseUrl = String.format("%s://%s:%d",
  77 + scheme,
  78 + request.getServerName(),
  79 + serverPort);
  80 + return baseUrl;
  81 + }
50 } 82 }
@@ -100,34 +100,54 @@ security: @@ -100,34 +100,54 @@ security:
100 basic: 100 basic:
101 enabled: "${SECURITY_BASIC_ENABLED:false}" 101 enabled: "${SECURITY_BASIC_ENABLED:false}"
102 oauth2: 102 oauth2:
  103 + # Enable/disable OAuth 2 login functionality
  104 + # For details please refer to https://thingsboard.io/docs/user-guide/oauth-2-support/
103 enabled: "${SECURITY_OAUTH2_ENABLED:false}" 105 enabled: "${SECURITY_OAUTH2_ENABLED:false}"
  106 + # Redirect URL where access code from external user management system will be processed
104 loginProcessingUrl: "${SECURITY_OAUTH2_LOGIN_PROCESSING_URL:/login/oauth2/code/}" 107 loginProcessingUrl: "${SECURITY_OAUTH2_LOGIN_PROCESSING_URL:/login/oauth2/code/}"
  108 + # List of SSO clients
105 clients: 109 clients:
106 default: 110 default:
107 - loginButtonLabel: "${SECURITY_OAUTH2_DEFAULT_LOGIN_BUTTON_LABEL:Default}" # Label that going to be show on login screen  
108 - loginButtonIcon: "${SECURITY_OAUTH2_DEFAULT_LOGIN_BUTTON_ICON:}" # Icon that going to be show on login screen. Material design icon ID (https://material.angularjs.org/latest/api/directive/mdIcon) 111 + # Label that going to be show on login button - 'Login with {loginButtonLabel}'
  112 + loginButtonLabel: "${SECURITY_OAUTH2_DEFAULT_LOGIN_BUTTON_LABEL:Default}"
  113 + # Icon that going to be show on login button. Material design icon ID (https://material.angularjs.org/latest/api/directive/mdIcon)
  114 + loginButtonIcon: "${SECURITY_OAUTH2_DEFAULT_LOGIN_BUTTON_ICON:}"
109 clientName: "${SECURITY_OAUTH2_DEFAULT_CLIENT_NAME:ClientName}" 115 clientName: "${SECURITY_OAUTH2_DEFAULT_CLIENT_NAME:ClientName}"
110 clientId: "${SECURITY_OAUTH2_DEFAULT_CLIENT_ID:}" 116 clientId: "${SECURITY_OAUTH2_DEFAULT_CLIENT_ID:}"
111 clientSecret: "${SECURITY_OAUTH2_DEFAULT_CLIENT_SECRET:}" 117 clientSecret: "${SECURITY_OAUTH2_DEFAULT_CLIENT_SECRET:}"
112 accessTokenUri: "${SECURITY_OAUTH2_DEFAULT_ACCESS_TOKEN_URI:}" 118 accessTokenUri: "${SECURITY_OAUTH2_DEFAULT_ACCESS_TOKEN_URI:}"
113 authorizationUri: "${SECURITY_OAUTH2_DEFAULT_AUTHORIZATION_URI:}" 119 authorizationUri: "${SECURITY_OAUTH2_DEFAULT_AUTHORIZATION_URI:}"
114 scope: "${SECURITY_OAUTH2_DEFAULT_SCOPE:}" 120 scope: "${SECURITY_OAUTH2_DEFAULT_SCOPE:}"
115 - redirectUriTemplate: "${SECURITY_OAUTH2_DEFAULT_REDIRECT_URI_TEMPLATE:http://localhost:8080/login/oauth2/code/}" # Must be in sync with security.oauth2.loginProcessingUrl 121 + # Redirect URL that must be in sync with 'security.oauth2.loginProcessingUrl', but domain name added
  122 + redirectUriTemplate: "${SECURITY_OAUTH2_DEFAULT_REDIRECT_URI_TEMPLATE:http://localhost:8080/login/oauth2/code/}"
116 jwkSetUri: "${SECURITY_OAUTH2_DEFAULT_JWK_SET_URI:}" 123 jwkSetUri: "${SECURITY_OAUTH2_DEFAULT_JWK_SET_URI:}"
117 - authorizationGrantType: "${SECURITY_OAUTH2_DEFAULT_AUTHORIZATION_GRANT_TYPE:authorization_code}" # authorization_code, implicit, refresh_token or client_credentials 124 + # 'authorization_code', 'implicit', 'refresh_token' or 'client_credentials'
  125 + authorizationGrantType: "${SECURITY_OAUTH2_DEFAULT_AUTHORIZATION_GRANT_TYPE:authorization_code}"
118 clientAuthenticationMethod: "${SECURITY_OAUTH2_DEFAULT_CLIENT_AUTHENTICATION_METHOD:post}" # basic or post 126 clientAuthenticationMethod: "${SECURITY_OAUTH2_DEFAULT_CLIENT_AUTHENTICATION_METHOD:post}" # basic or post
119 userInfoUri: "${SECURITY_OAUTH2_DEFAULT_USER_INFO_URI:}" 127 userInfoUri: "${SECURITY_OAUTH2_DEFAULT_USER_INFO_URI:}"
120 userNameAttributeName: "${SECURITY_OAUTH2_DEFAULT_USER_NAME_ATTRIBUTE_NAME:email}" 128 userNameAttributeName: "${SECURITY_OAUTH2_DEFAULT_USER_NAME_ATTRIBUTE_NAME:email}"
121 mapperConfig: 129 mapperConfig:
122 - type: "${SECURITY_OAUTH2_DEFAULT_MAPPER_TYPE:basic}" # basic or custom 130 + # Allows to create user if it not exists
  131 + allowUserCreation: "${SECURITY_OAUTH2_DEFAULT_MAPPER_ALLOW_USER_CREATION:true}"
  132 + # Allows user to setup ThingsBoard internal password and login over default Login window
  133 + activateUser: "${SECURITY_OAUTH2_DEFAULT_MAPPER_ACTIVATE_USER:false}"
  134 + # Mapper type of converter from external user into internal - 'basic' or 'custom'
  135 + type: "${SECURITY_OAUTH2_DEFAULT_MAPPER_TYPE:basic}"
123 basic: 136 basic:
124 - allowUserCreation: "${SECURITY_OAUTH2_DEFAULT_MAPPER_BASIC_ALLOW_USER_CREATION:true}" # Allows to create user if it not exists  
125 - emailAttributeKey: "${SECURITY_OAUTH2_DEFAULT_MAPPER_BASIC_EMAIL_ATTRIBUTE_KEY:email}" # Attribute key to use as email for the user 137 + # Key from attributes of external user object to use as email
  138 + emailAttributeKey: "${SECURITY_OAUTH2_DEFAULT_MAPPER_BASIC_EMAIL_ATTRIBUTE_KEY:email}"
126 firstNameAttributeKey: "${SECURITY_OAUTH2_DEFAULT_MAPPER_BASIC_FIRST_NAME_ATTRIBUTE_KEY:}" 139 firstNameAttributeKey: "${SECURITY_OAUTH2_DEFAULT_MAPPER_BASIC_FIRST_NAME_ATTRIBUTE_KEY:}"
127 lastNameAttributeKey: "${SECURITY_OAUTH2_DEFAULT_MAPPER_BASIC_LAST_NAME_ATTRIBUTE_KEY:}" 140 lastNameAttributeKey: "${SECURITY_OAUTH2_DEFAULT_MAPPER_BASIC_LAST_NAME_ATTRIBUTE_KEY:}"
128 - tenantNameStrategy: "${SECURITY_OAUTH2_DEFAULT_MAPPER_BASIC_TENANT_NAME_STRATEGY:domain}" # domain, email or custom  
129 - tenantNamePattern: "${SECURITY_OAUTH2_DEFAULT_MAPPER_BASIC_TENANT_NAME_PATTERN:}" # %{attribute_key} as placeholder for attributes value by key  
130 - customerNamePattern: "${SECURITY_OAUTH2_DEFAULT_MAPPER_BASIC_CUSTOMER_NAME_PATTERN:}" # %{attribute_key} as placeholder for attributes value by key 141 + # Strategy for generating Tenant from external user object - 'domain', 'email' or 'custom'
  142 + # 'domain' - name of the Tenant will be extracted as domain from the email of the user
  143 + # 'email' - name of the Tenant will email of the user
  144 + # 'custom' - please configure 'tenantNamePattern' for custom mapping
  145 + tenantNameStrategy: "${SECURITY_OAUTH2_DEFAULT_MAPPER_BASIC_TENANT_NAME_STRATEGY:domain}"
  146 + # %{attribute_key} as placeholder for attribute value of attributes of external user object
  147 + tenantNamePattern: "${SECURITY_OAUTH2_DEFAULT_MAPPER_BASIC_TENANT_NAME_PATTERN:}"
  148 + # If this field is not empty, user will be created as a user under defined Customer
  149 + # %{attribute_key} as placeholder for attribute value of attributes of external user object
  150 + customerNamePattern: "${SECURITY_OAUTH2_DEFAULT_MAPPER_BASIC_CUSTOMER_NAME_PATTERN:}"
131 custom: 151 custom:
132 url: "${SECURITY_OAUTH2_DEFAULT_MAPPER_CUSTOM_URL:}" 152 url: "${SECURITY_OAUTH2_DEFAULT_MAPPER_CUSTOM_URL:}"
133 username: "${SECURITY_OAUTH2_DEFAULT_MAPPER_CUSTOM_USERNAME:}" 153 username: "${SECURITY_OAUTH2_DEFAULT_MAPPER_CUSTOM_USERNAME:}"
@@ -20,13 +20,14 @@ import lombok.Data; @@ -20,13 +20,14 @@ import lombok.Data;
20 @Data 20 @Data
21 public class OAuth2ClientMapperConfig { 21 public class OAuth2ClientMapperConfig {
22 22
  23 + private boolean allowUserCreation;
  24 + private boolean activateUser;
23 private String type; 25 private String type;
24 private BasicOAuth2ClientMapperConfig basic; 26 private BasicOAuth2ClientMapperConfig basic;
25 private CustomOAuth2ClientMapperConfig custom; 27 private CustomOAuth2ClientMapperConfig custom;
26 28
27 @Data 29 @Data
28 public static class BasicOAuth2ClientMapperConfig { 30 public static class BasicOAuth2ClientMapperConfig {
29 - private boolean allowUserCreation;  
30 private String emailAttributeKey; 31 private String emailAttributeKey;
31 private String firstNameAttributeKey; 32 private String firstNameAttributeKey;
32 private String lastNameAttributeKey; 33 private String lastNameAttributeKey;
@@ -468,11 +468,23 @@ @@ -468,11 +468,23 @@
468 <groupId>org.springframework.security</groupId> 468 <groupId>org.springframework.security</groupId>
469 <artifactId>spring-security-oauth2-client</artifactId> 469 <artifactId>spring-security-oauth2-client</artifactId>
470 <version>${spring-security.version}</version> 470 <version>${spring-security.version}</version>
  471 + <exclusions>
  472 + <exclusion>
  473 + <groupId>org.springframework</groupId>
  474 + <artifactId>spring-core</artifactId>
  475 + </exclusion>
  476 + </exclusions>
471 </dependency> 477 </dependency>
472 <dependency> 478 <dependency>
473 <groupId>org.springframework.security</groupId> 479 <groupId>org.springframework.security</groupId>
474 <artifactId>spring-security-oauth2-jose</artifactId> 480 <artifactId>spring-security-oauth2-jose</artifactId>
475 <version>${spring-security.version}</version> 481 <version>${spring-security.version}</version>
  482 + <exclusions>
  483 + <exclusion>
  484 + <groupId>org.springframework</groupId>
  485 + <artifactId>spring-core</artifactId>
  486 + </exclusion>
  487 + </exclusions>
476 </dependency> 488 </dependency>
477 <dependency> 489 <dependency>
478 <groupId>org.springframework.boot</groupId> 490 <groupId>org.springframework.boot</groupId>
@@ -20,7 +20,6 @@ import com.google.common.cache.CacheLoader; @@ -20,7 +20,6 @@ import com.google.common.cache.CacheLoader;
20 import com.google.common.cache.LoadingCache; 20 import com.google.common.cache.LoadingCache;
21 import com.google.common.util.concurrent.Futures; 21 import com.google.common.util.concurrent.Futures;
22 import com.google.common.util.concurrent.ListenableFuture; 22 import com.google.common.util.concurrent.ListenableFuture;
23 -import com.google.common.util.concurrent.MoreExecutors;  
24 import lombok.AllArgsConstructor; 23 import lombok.AllArgsConstructor;
25 import lombok.Data; 24 import lombok.Data;
26 import lombok.NoArgsConstructor; 25 import lombok.NoArgsConstructor;
@@ -78,7 +77,8 @@ public abstract class TbAbstractRelationActionNode<C extends TbAbstractRelationA @@ -78,7 +77,8 @@ public abstract class TbAbstractRelationActionNode<C extends TbAbstractRelationA
78 77
79 @Override 78 @Override
80 public void onMsg(TbContext ctx, TbMsg msg) { 79 public void onMsg(TbContext ctx, TbMsg msg) {
81 - withCallback(processEntityRelationAction(ctx, msg), 80 + String relationType = processPattern(msg, config.getRelationType());
  81 + withCallback(processEntityRelationAction(ctx, msg, relationType),
82 filterResult -> ctx.tellNext(filterResult.getMsg(), filterResult.isResult() ? SUCCESS : FAILURE), t -> ctx.tellFailure(msg, t), ctx.getDbCallbackExecutor()); 82 filterResult -> ctx.tellNext(filterResult.getMsg(), filterResult.isResult() ? SUCCESS : FAILURE), t -> ctx.tellFailure(msg, t), ctx.getDbCallbackExecutor());
83 } 83 }
84 84
@@ -86,13 +86,13 @@ public abstract class TbAbstractRelationActionNode<C extends TbAbstractRelationA @@ -86,13 +86,13 @@ public abstract class TbAbstractRelationActionNode<C extends TbAbstractRelationA
86 public void destroy() { 86 public void destroy() {
87 } 87 }
88 88
89 - protected ListenableFuture<RelationContainer> processEntityRelationAction(TbContext ctx, TbMsg msg) {  
90 - return Futures.transformAsync(getEntity(ctx, msg), entityContainer -> doProcessEntityRelationAction(ctx, msg, entityContainer), MoreExecutors.directExecutor()); 89 + protected ListenableFuture<RelationContainer> processEntityRelationAction(TbContext ctx, TbMsg msg, String relationType) {
  90 + return Futures.transformAsync(getEntity(ctx, msg), entityContainer -> doProcessEntityRelationAction(ctx, msg, entityContainer, relationType), ctx.getDbCallbackExecutor());
91 } 91 }
92 92
93 protected abstract boolean createEntityIfNotExists(); 93 protected abstract boolean createEntityIfNotExists();
94 94
95 - protected abstract ListenableFuture<RelationContainer> doProcessEntityRelationAction(TbContext ctx, TbMsg msg, EntityContainer entityContainer); 95 + protected abstract ListenableFuture<RelationContainer> doProcessEntityRelationAction(TbContext ctx, TbMsg msg, EntityContainer entityContainer, String relationType);
96 96
97 protected abstract C loadEntityNodeActionConfig(TbNodeConfiguration configuration) throws TbNodeException; 97 protected abstract C loadEntityNodeActionConfig(TbNodeConfiguration configuration) throws TbNodeException;
98 98
@@ -120,11 +120,11 @@ public abstract class TbAbstractRelationActionNode<C extends TbAbstractRelationA @@ -120,11 +120,11 @@ public abstract class TbAbstractRelationActionNode<C extends TbAbstractRelationA
120 if (EntitySearchDirection.FROM.name().equals(this.config.getDirection())) { 120 if (EntitySearchDirection.FROM.name().equals(this.config.getDirection())) {
121 searchDirectionIds.setFromId(EntityIdFactory.getByTypeAndId(entityContainer.getEntityType().name(), entityContainer.getEntityId().toString())); 121 searchDirectionIds.setFromId(EntityIdFactory.getByTypeAndId(entityContainer.getEntityType().name(), entityContainer.getEntityId().toString()));
122 searchDirectionIds.setToId(msg.getOriginator()); 122 searchDirectionIds.setToId(msg.getOriginator());
123 - searchDirectionIds.setOrignatorDirectionFrom(false); 123 + searchDirectionIds.setOriginatorDirectionFrom(false);
124 } else { 124 } else {
125 searchDirectionIds.setToId(EntityIdFactory.getByTypeAndId(entityContainer.getEntityType().name(), entityContainer.getEntityId().toString())); 125 searchDirectionIds.setToId(EntityIdFactory.getByTypeAndId(entityContainer.getEntityType().name(), entityContainer.getEntityId().toString()));
126 searchDirectionIds.setFromId(msg.getOriginator()); 126 searchDirectionIds.setFromId(msg.getOriginator());
127 - searchDirectionIds.setOrignatorDirectionFrom(true); 127 + searchDirectionIds.setOriginatorDirectionFrom(true);
128 } 128 }
129 return searchDirectionIds; 129 return searchDirectionIds;
130 } 130 }
@@ -153,7 +153,7 @@ public abstract class TbAbstractRelationActionNode<C extends TbAbstractRelationA @@ -153,7 +153,7 @@ public abstract class TbAbstractRelationActionNode<C extends TbAbstractRelationA
153 protected static class SearchDirectionIds { 153 protected static class SearchDirectionIds {
154 private EntityId fromId; 154 private EntityId fromId;
155 private EntityId toId; 155 private EntityId toId;
156 - private boolean orignatorDirectionFrom; 156 + private boolean originatorDirectionFrom;
157 } 157 }
158 158
159 private static class EntityCacheLoader extends CacheLoader<EntityKey, EntityContainer> { 159 private static class EntityCacheLoader extends CacheLoader<EntityKey, EntityContainer> {
@@ -17,7 +17,6 @@ package org.thingsboard.rule.engine.action; @@ -17,7 +17,6 @@ package org.thingsboard.rule.engine.action;
17 17
18 import com.google.common.util.concurrent.Futures; 18 import com.google.common.util.concurrent.Futures;
19 import com.google.common.util.concurrent.ListenableFuture; 19 import com.google.common.util.concurrent.ListenableFuture;
20 -import com.google.common.util.concurrent.MoreExecutors;  
21 import lombok.extern.slf4j.Slf4j; 20 import lombok.extern.slf4j.Slf4j;
22 import org.thingsboard.rule.engine.api.RuleNode; 21 import org.thingsboard.rule.engine.api.RuleNode;
23 import org.thingsboard.rule.engine.api.TbContext; 22 import org.thingsboard.rule.engine.api.TbContext;
@@ -57,8 +56,6 @@ import java.util.List; @@ -57,8 +56,6 @@ import java.util.List;
57 ) 56 )
58 public class TbCreateRelationNode extends TbAbstractRelationActionNode<TbCreateRelationNodeConfiguration> { 57 public class TbCreateRelationNode extends TbAbstractRelationActionNode<TbCreateRelationNodeConfiguration> {
59 58
60 - private String relationType;  
61 -  
62 @Override 59 @Override
63 protected TbCreateRelationNodeConfiguration loadEntityNodeActionConfig(TbNodeConfiguration configuration) throws TbNodeException { 60 protected TbCreateRelationNodeConfiguration loadEntityNodeActionConfig(TbNodeConfiguration configuration) throws TbNodeException {
64 return TbNodeUtils.convert(configuration, TbCreateRelationNodeConfiguration.class); 61 return TbNodeUtils.convert(configuration, TbCreateRelationNodeConfiguration.class);
@@ -70,8 +67,8 @@ public class TbCreateRelationNode extends TbAbstractRelationActionNode<TbCreateR @@ -70,8 +67,8 @@ public class TbCreateRelationNode extends TbAbstractRelationActionNode<TbCreateR
70 } 67 }
71 68
72 @Override 69 @Override
73 - protected ListenableFuture<RelationContainer> doProcessEntityRelationAction(TbContext ctx, TbMsg msg, EntityContainer entity) {  
74 - ListenableFuture<Boolean> future = createIfAbsent(ctx, msg, entity); 70 + protected ListenableFuture<RelationContainer> doProcessEntityRelationAction(TbContext ctx, TbMsg msg, EntityContainer entity, String relationType) {
  71 + ListenableFuture<Boolean> future = createIfAbsent(ctx, msg, entity, relationType);
75 return Futures.transform(future, result -> { 72 return Futures.transform(future, result -> {
76 RelationContainer container = new RelationContainer(); 73 RelationContainer container = new RelationContainer();
77 if (result && config.isChangeOriginatorToRelatedEntity()) { 74 if (result && config.isChangeOriginatorToRelatedEntity()) {
@@ -82,16 +79,15 @@ public class TbCreateRelationNode extends TbAbstractRelationActionNode<TbCreateR @@ -82,16 +79,15 @@ public class TbCreateRelationNode extends TbAbstractRelationActionNode<TbCreateR
82 } 79 }
83 container.setResult(result); 80 container.setResult(result);
84 return container; 81 return container;
85 - }, MoreExecutors.directExecutor()); 82 + }, ctx.getDbCallbackExecutor());
86 } 83 }
87 84
88 - private ListenableFuture<Boolean> createIfAbsent(TbContext ctx, TbMsg msg, EntityContainer entityContainer) {  
89 - relationType = processPattern(msg, config.getRelationType()); 85 + private ListenableFuture<Boolean> createIfAbsent(TbContext ctx, TbMsg msg, EntityContainer entityContainer, String relationType) {
90 SearchDirectionIds sdId = processSingleSearchDirection(msg, entityContainer); 86 SearchDirectionIds sdId = processSingleSearchDirection(msg, entityContainer);
91 ListenableFuture<Boolean> checkRelationFuture = Futures.transformAsync(ctx.getRelationService().checkRelation(ctx.getTenantId(), sdId.getFromId(), sdId.getToId(), relationType, RelationTypeGroup.COMMON), result -> { 87 ListenableFuture<Boolean> checkRelationFuture = Futures.transformAsync(ctx.getRelationService().checkRelation(ctx.getTenantId(), sdId.getFromId(), sdId.getToId(), relationType, RelationTypeGroup.COMMON), result -> {
92 if (!result) { 88 if (!result) {
93 if (config.isRemoveCurrentRelations()) { 89 if (config.isRemoveCurrentRelations()) {
94 - return processDeleteRelations(ctx, processFindRelations(ctx, msg, sdId)); 90 + return processDeleteRelations(ctx, processFindRelations(ctx, msg, sdId, relationType));
95 } 91 }
96 return Futures.immediateFuture(false); 92 return Futures.immediateFuture(false);
97 } 93 }
@@ -100,14 +96,14 @@ public class TbCreateRelationNode extends TbAbstractRelationActionNode<TbCreateR @@ -100,14 +96,14 @@ public class TbCreateRelationNode extends TbAbstractRelationActionNode<TbCreateR
100 96
101 return Futures.transformAsync(checkRelationFuture, result -> { 97 return Futures.transformAsync(checkRelationFuture, result -> {
102 if (!result) { 98 if (!result) {
103 - return processCreateRelation(ctx, entityContainer, sdId); 99 + return processCreateRelation(ctx, entityContainer, sdId, relationType);
104 } 100 }
105 return Futures.immediateFuture(true); 101 return Futures.immediateFuture(true);
106 }, ctx.getDbCallbackExecutor()); 102 }, ctx.getDbCallbackExecutor());
107 } 103 }
108 104
109 - private ListenableFuture<List<EntityRelation>> processFindRelations(TbContext ctx, TbMsg msg, SearchDirectionIds sdId) {  
110 - if (sdId.isOrignatorDirectionFrom()) { 105 + private ListenableFuture<List<EntityRelation>> processFindRelations(TbContext ctx, TbMsg msg, SearchDirectionIds sdId, String relationType) {
  106 + if (sdId.isOriginatorDirectionFrom()) {
111 return ctx.getRelationService().findByFromAndTypeAsync(ctx.getTenantId(), msg.getOriginator(), relationType, RelationTypeGroup.COMMON); 107 return ctx.getRelationService().findByFromAndTypeAsync(ctx.getTenantId(), msg.getOriginator(), relationType, RelationTypeGroup.COMMON);
112 } else { 108 } else {
113 return ctx.getRelationService().findByToAndTypeAsync(ctx.getTenantId(), msg.getOriginator(), relationType, RelationTypeGroup.COMMON); 109 return ctx.getRelationService().findByToAndTypeAsync(ctx.getTenantId(), msg.getOriginator(), relationType, RelationTypeGroup.COMMON);
@@ -121,91 +117,91 @@ public class TbCreateRelationNode extends TbAbstractRelationActionNode<TbCreateR @@ -121,91 +117,91 @@ public class TbCreateRelationNode extends TbAbstractRelationActionNode<TbCreateR
121 for (EntityRelation relation : entityRelations) { 117 for (EntityRelation relation : entityRelations) {
122 list.add(ctx.getRelationService().deleteRelationAsync(ctx.getTenantId(), relation)); 118 list.add(ctx.getRelationService().deleteRelationAsync(ctx.getTenantId(), relation));
123 } 119 }
124 - return Futures.transform(Futures.allAsList(list), result -> false, MoreExecutors.directExecutor()); 120 + return Futures.transform(Futures.allAsList(list), result -> false, ctx.getDbCallbackExecutor());
125 } 121 }
126 return Futures.immediateFuture(false); 122 return Futures.immediateFuture(false);
127 }, ctx.getDbCallbackExecutor()); 123 }, ctx.getDbCallbackExecutor());
128 } 124 }
129 125
130 - private ListenableFuture<Boolean> processCreateRelation(TbContext ctx, EntityContainer entityContainer, SearchDirectionIds sdId) { 126 + private ListenableFuture<Boolean> processCreateRelation(TbContext ctx, EntityContainer entityContainer, SearchDirectionIds sdId, String relationType) {
131 switch (entityContainer.getEntityType()) { 127 switch (entityContainer.getEntityType()) {
132 case ASSET: 128 case ASSET:
133 - return processAsset(ctx, entityContainer, sdId); 129 + return processAsset(ctx, entityContainer, sdId, relationType);
134 case DEVICE: 130 case DEVICE:
135 - return processDevice(ctx, entityContainer, sdId); 131 + return processDevice(ctx, entityContainer, sdId, relationType);
136 case CUSTOMER: 132 case CUSTOMER:
137 - return processCustomer(ctx, entityContainer, sdId); 133 + return processCustomer(ctx, entityContainer, sdId, relationType);
138 case DASHBOARD: 134 case DASHBOARD:
139 - return processDashboard(ctx, entityContainer, sdId); 135 + return processDashboard(ctx, entityContainer, sdId, relationType);
140 case ENTITY_VIEW: 136 case ENTITY_VIEW:
141 - return processView(ctx, entityContainer, sdId); 137 + return processView(ctx, entityContainer, sdId, relationType);
142 case TENANT: 138 case TENANT:
143 - return processTenant(ctx, entityContainer, sdId); 139 + return processTenant(ctx, entityContainer, sdId, relationType);
144 } 140 }
145 return Futures.immediateFuture(true); 141 return Futures.immediateFuture(true);
146 } 142 }
147 143
148 - private ListenableFuture<Boolean> processView(TbContext ctx, EntityContainer entityContainer, SearchDirectionIds sdId) { 144 + private ListenableFuture<Boolean> processView(TbContext ctx, EntityContainer entityContainer, SearchDirectionIds sdId, String relationType) {
149 return Futures.transformAsync(ctx.getEntityViewService().findEntityViewByIdAsync(ctx.getTenantId(), new EntityViewId(entityContainer.getEntityId().getId())), entityView -> { 145 return Futures.transformAsync(ctx.getEntityViewService().findEntityViewByIdAsync(ctx.getTenantId(), new EntityViewId(entityContainer.getEntityId().getId())), entityView -> {
150 if (entityView != null) { 146 if (entityView != null) {
151 - return processSave(ctx, sdId); 147 + return processSave(ctx, sdId, relationType);
152 } else { 148 } else {
153 return Futures.immediateFuture(true); 149 return Futures.immediateFuture(true);
154 } 150 }
155 }, ctx.getDbCallbackExecutor()); 151 }, ctx.getDbCallbackExecutor());
156 } 152 }
157 153
158 - private ListenableFuture<Boolean> processDevice(TbContext ctx, EntityContainer entityContainer, SearchDirectionIds sdId) { 154 + private ListenableFuture<Boolean> processDevice(TbContext ctx, EntityContainer entityContainer, SearchDirectionIds sdId, String relationType) {
159 return Futures.transformAsync(ctx.getDeviceService().findDeviceByIdAsync(ctx.getTenantId(), new DeviceId(entityContainer.getEntityId().getId())), device -> { 155 return Futures.transformAsync(ctx.getDeviceService().findDeviceByIdAsync(ctx.getTenantId(), new DeviceId(entityContainer.getEntityId().getId())), device -> {
160 if (device != null) { 156 if (device != null) {
161 - return processSave(ctx, sdId); 157 + return processSave(ctx, sdId, relationType);
162 } else { 158 } else {
163 return Futures.immediateFuture(true); 159 return Futures.immediateFuture(true);
164 } 160 }
165 - }, MoreExecutors.directExecutor()); 161 + }, ctx.getDbCallbackExecutor());
166 } 162 }
167 163
168 - private ListenableFuture<Boolean> processAsset(TbContext ctx, EntityContainer entityContainer, SearchDirectionIds sdId) { 164 + private ListenableFuture<Boolean> processAsset(TbContext ctx, EntityContainer entityContainer, SearchDirectionIds sdId, String relationType) {
169 return Futures.transformAsync(ctx.getAssetService().findAssetByIdAsync(ctx.getTenantId(), new AssetId(entityContainer.getEntityId().getId())), asset -> { 165 return Futures.transformAsync(ctx.getAssetService().findAssetByIdAsync(ctx.getTenantId(), new AssetId(entityContainer.getEntityId().getId())), asset -> {
170 if (asset != null) { 166 if (asset != null) {
171 - return processSave(ctx, sdId); 167 + return processSave(ctx, sdId, relationType);
172 } else { 168 } else {
173 return Futures.immediateFuture(true); 169 return Futures.immediateFuture(true);
174 } 170 }
175 }, ctx.getDbCallbackExecutor()); 171 }, ctx.getDbCallbackExecutor());
176 } 172 }
177 173
178 - private ListenableFuture<Boolean> processCustomer(TbContext ctx, EntityContainer entityContainer, SearchDirectionIds sdId) { 174 + private ListenableFuture<Boolean> processCustomer(TbContext ctx, EntityContainer entityContainer, SearchDirectionIds sdId, String relationType) {
179 return Futures.transformAsync(ctx.getCustomerService().findCustomerByIdAsync(ctx.getTenantId(), new CustomerId(entityContainer.getEntityId().getId())), customer -> { 175 return Futures.transformAsync(ctx.getCustomerService().findCustomerByIdAsync(ctx.getTenantId(), new CustomerId(entityContainer.getEntityId().getId())), customer -> {
180 if (customer != null) { 176 if (customer != null) {
181 - return processSave(ctx, sdId); 177 + return processSave(ctx, sdId, relationType);
182 } else { 178 } else {
183 return Futures.immediateFuture(true); 179 return Futures.immediateFuture(true);
184 } 180 }
185 }, ctx.getDbCallbackExecutor()); 181 }, ctx.getDbCallbackExecutor());
186 } 182 }
187 183
188 - private ListenableFuture<Boolean> processDashboard(TbContext ctx, EntityContainer entityContainer, SearchDirectionIds sdId) { 184 + private ListenableFuture<Boolean> processDashboard(TbContext ctx, EntityContainer entityContainer, SearchDirectionIds sdId, String relationType) {
189 return Futures.transformAsync(ctx.getDashboardService().findDashboardByIdAsync(ctx.getTenantId(), new DashboardId(entityContainer.getEntityId().getId())), dashboard -> { 185 return Futures.transformAsync(ctx.getDashboardService().findDashboardByIdAsync(ctx.getTenantId(), new DashboardId(entityContainer.getEntityId().getId())), dashboard -> {
190 if (dashboard != null) { 186 if (dashboard != null) {
191 - return processSave(ctx, sdId); 187 + return processSave(ctx, sdId, relationType);
192 } else { 188 } else {
193 return Futures.immediateFuture(true); 189 return Futures.immediateFuture(true);
194 } 190 }
195 }, ctx.getDbCallbackExecutor()); 191 }, ctx.getDbCallbackExecutor());
196 } 192 }
197 193
198 - private ListenableFuture<Boolean> processTenant(TbContext ctx, EntityContainer entityContainer, SearchDirectionIds sdId) { 194 + private ListenableFuture<Boolean> processTenant(TbContext ctx, EntityContainer entityContainer, SearchDirectionIds sdId, String relationType) {
199 return Futures.transformAsync(ctx.getTenantService().findTenantByIdAsync(ctx.getTenantId(), new TenantId(entityContainer.getEntityId().getId())), tenant -> { 195 return Futures.transformAsync(ctx.getTenantService().findTenantByIdAsync(ctx.getTenantId(), new TenantId(entityContainer.getEntityId().getId())), tenant -> {
200 if (tenant != null) { 196 if (tenant != null) {
201 - return processSave(ctx, sdId); 197 + return processSave(ctx, sdId, relationType);
202 } else { 198 } else {
203 return Futures.immediateFuture(true); 199 return Futures.immediateFuture(true);
204 } 200 }
205 }, ctx.getDbCallbackExecutor()); 201 }, ctx.getDbCallbackExecutor());
206 } 202 }
207 203
208 - private ListenableFuture<Boolean> processSave(TbContext ctx, SearchDirectionIds sdId) { 204 + private ListenableFuture<Boolean> processSave(TbContext ctx, SearchDirectionIds sdId, String relationType) {
209 return ctx.getRelationService().saveRelationAsync(ctx.getTenantId(), new EntityRelation(sdId.getFromId(), sdId.getToId(), relationType, RelationTypeGroup.COMMON)); 205 return ctx.getRelationService().saveRelationAsync(ctx.getTenantId(), new EntityRelation(sdId.getFromId(), sdId.getToId(), relationType, RelationTypeGroup.COMMON));
210 } 206 }
211 207
@@ -17,7 +17,6 @@ package org.thingsboard.rule.engine.action; @@ -17,7 +17,6 @@ package org.thingsboard.rule.engine.action;
17 17
18 import com.google.common.util.concurrent.Futures; 18 import com.google.common.util.concurrent.Futures;
19 import com.google.common.util.concurrent.ListenableFuture; 19 import com.google.common.util.concurrent.ListenableFuture;
20 -import com.google.common.util.concurrent.MoreExecutors;  
21 import lombok.extern.slf4j.Slf4j; 20 import lombok.extern.slf4j.Slf4j;
22 import org.thingsboard.rule.engine.api.RuleNode; 21 import org.thingsboard.rule.engine.api.RuleNode;
23 import org.thingsboard.rule.engine.api.TbContext; 22 import org.thingsboard.rule.engine.api.TbContext;
@@ -48,8 +47,6 @@ import java.util.List; @@ -48,8 +47,6 @@ import java.util.List;
48 ) 47 )
49 public class TbDeleteRelationNode extends TbAbstractRelationActionNode<TbDeleteRelationNodeConfiguration> { 48 public class TbDeleteRelationNode extends TbAbstractRelationActionNode<TbDeleteRelationNodeConfiguration> {
50 49
51 - private String relationType;  
52 -  
53 @Override 50 @Override
54 protected TbDeleteRelationNodeConfiguration loadEntityNodeActionConfig(TbNodeConfiguration configuration) throws TbNodeException { 51 protected TbDeleteRelationNodeConfiguration loadEntityNodeActionConfig(TbNodeConfiguration configuration) throws TbNodeException {
55 return TbNodeUtils.convert(configuration, TbDeleteRelationNodeConfiguration.class); 52 return TbNodeUtils.convert(configuration, TbDeleteRelationNodeConfiguration.class);
@@ -61,21 +58,20 @@ public class TbDeleteRelationNode extends TbAbstractRelationActionNode<TbDeleteR @@ -61,21 +58,20 @@ public class TbDeleteRelationNode extends TbAbstractRelationActionNode<TbDeleteR
61 } 58 }
62 59
63 @Override 60 @Override
64 - protected ListenableFuture<RelationContainer> processEntityRelationAction(TbContext ctx, TbMsg msg) {  
65 - return getRelationContainerListenableFuture(ctx, msg); 61 + protected ListenableFuture<RelationContainer> processEntityRelationAction(TbContext ctx, TbMsg msg, String relationType) {
  62 + return getRelationContainerListenableFuture(ctx, msg, relationType);
66 } 63 }
67 64
68 @Override 65 @Override
69 - protected ListenableFuture<RelationContainer> doProcessEntityRelationAction(TbContext ctx, TbMsg msg, EntityContainer entityContainer) {  
70 - return Futures.transform(processSingle(ctx, msg, entityContainer), result -> new RelationContainer(msg, result), MoreExecutors.directExecutor()); 66 + protected ListenableFuture<RelationContainer> doProcessEntityRelationAction(TbContext ctx, TbMsg msg, EntityContainer entityContainer, String relationType) {
  67 + return Futures.transform(processSingle(ctx, msg, entityContainer, relationType), result -> new RelationContainer(msg, result), ctx.getDbCallbackExecutor());
71 } 68 }
72 69
73 - private ListenableFuture<RelationContainer> getRelationContainerListenableFuture(TbContext ctx, TbMsg msg) {  
74 - relationType = processPattern(msg, config.getRelationType()); 70 + private ListenableFuture<RelationContainer> getRelationContainerListenableFuture(TbContext ctx, TbMsg msg, String relationType) {
75 if (config.isDeleteForSingleEntity()) { 71 if (config.isDeleteForSingleEntity()) {
76 - return Futures.transformAsync(getEntity(ctx, msg), entityContainer -> doProcessEntityRelationAction(ctx, msg, entityContainer), MoreExecutors.directExecutor()); 72 + return Futures.transformAsync(getEntity(ctx, msg), entityContainer -> doProcessEntityRelationAction(ctx, msg, entityContainer, relationType), ctx.getDbCallbackExecutor());
77 } else { 73 } else {
78 - return Futures.transform(processList(ctx, msg), result -> new RelationContainer(msg, result), MoreExecutors.directExecutor()); 74 + return Futures.transform(processList(ctx, msg), result -> new RelationContainer(msg, result), ctx.getDbCallbackExecutor());
79 } 75 }
80 } 76 }
81 77
@@ -95,23 +91,23 @@ public class TbDeleteRelationNode extends TbAbstractRelationActionNode<TbDeleteR @@ -95,23 +91,23 @@ public class TbDeleteRelationNode extends TbAbstractRelationActionNode<TbDeleteR
95 } 91 }
96 } 92 }
97 return Futures.immediateFuture(true); 93 return Futures.immediateFuture(true);
98 - }, MoreExecutors.directExecutor()); 94 + }, ctx.getDbCallbackExecutor());
99 } 95 }
100 - }, MoreExecutors.directExecutor()); 96 + }, ctx.getDbCallbackExecutor());
101 } 97 }
102 98
103 - private ListenableFuture<Boolean> processSingle(TbContext ctx, TbMsg msg, EntityContainer entityContainer) { 99 + private ListenableFuture<Boolean> processSingle(TbContext ctx, TbMsg msg, EntityContainer entityContainer, String relationType) {
104 SearchDirectionIds sdId = processSingleSearchDirection(msg, entityContainer); 100 SearchDirectionIds sdId = processSingleSearchDirection(msg, entityContainer);
105 return Futures.transformAsync(ctx.getRelationService().checkRelation(ctx.getTenantId(), sdId.getFromId(), sdId.getToId(), relationType, RelationTypeGroup.COMMON), 101 return Futures.transformAsync(ctx.getRelationService().checkRelation(ctx.getTenantId(), sdId.getFromId(), sdId.getToId(), relationType, RelationTypeGroup.COMMON),
106 result -> { 102 result -> {
107 if (result) { 103 if (result) {
108 - return processSingleDeleteRelation(ctx, sdId); 104 + return processSingleDeleteRelation(ctx, sdId, relationType);
109 } 105 }
110 return Futures.immediateFuture(true); 106 return Futures.immediateFuture(true);
111 - }, MoreExecutors.directExecutor()); 107 + }, ctx.getDbCallbackExecutor());
112 } 108 }
113 109
114 - private ListenableFuture<Boolean> processSingleDeleteRelation(TbContext ctx, SearchDirectionIds sdId) { 110 + private ListenableFuture<Boolean> processSingleDeleteRelation(TbContext ctx, SearchDirectionIds sdId, String relationType) {
115 return ctx.getRelationService().deleteRelationAsync(ctx.getTenantId(), sdId.getFromId(), sdId.getToId(), relationType, RelationTypeGroup.COMMON); 111 return ctx.getRelationService().deleteRelationAsync(ctx.getTenantId(), sdId.getFromId(), sdId.getToId(), relationType, RelationTypeGroup.COMMON);
116 } 112 }
117 113
@@ -22,7 +22,7 @@ export default angular.module('thingsboard.api.user', [thingsboardApiLogin, @@ -22,7 +22,7 @@ export default angular.module('thingsboard.api.user', [thingsboardApiLogin,
22 .name; 22 .name;
23 23
24 /*@ngInject*/ 24 /*@ngInject*/
25 -function UserService($http, $q, $rootScope, adminService, dashboardService, timeService, loginService, toast, store, jwtHelper, $translate, $state, $location) { 25 +function UserService($http, $q, $rootScope, adminService, dashboardService, timeService, loginService, toast, store, jwtHelper, $translate, $state, $location, $mdDialog) {
26 var currentUser = null, 26 var currentUser = null,
27 currentUserDetails = null, 27 currentUserDetails = null,
28 lastPublicDashboardId = null, 28 lastPublicDashboardId = null,
@@ -406,6 +406,10 @@ function UserService($http, $q, $rootScope, adminService, dashboardService, time @@ -406,6 +406,10 @@ function UserService($http, $q, $rootScope, adminService, dashboardService, time
406 }, function fail() { 406 }, function fail() {
407 deferred.reject(); 407 deferred.reject();
408 }); 408 });
  409 + } else if (locationSearch.loginError) {
  410 + showLoginErrorDialog(locationSearch.loginError);
  411 + $location.search('loginError', null);
  412 + deferred.reject();
409 } else { 413 } else {
410 procceedJwtTokenValidate(); 414 procceedJwtTokenValidate();
411 } 415 }
@@ -415,6 +419,17 @@ function UserService($http, $q, $rootScope, adminService, dashboardService, time @@ -415,6 +419,17 @@ function UserService($http, $q, $rootScope, adminService, dashboardService, time
415 return deferred.promise; 419 return deferred.promise;
416 } 420 }
417 421
  422 + function showLoginErrorDialog(loginError) {
  423 + $translate(['login.error',
  424 + 'action.close']).then(function (translations) {
  425 + var alert = $mdDialog.alert()
  426 + .title(translations['login.error'])
  427 + .htmlContent(loginError)
  428 + .ok(translations['action.close']);
  429 + $mdDialog.show(alert);
  430 + });
  431 + }
  432 +
418 function loadIsUserTokenAccessEnabled() { 433 function loadIsUserTokenAccessEnabled() {
419 var deferred = $q.defer(); 434 var deferred = $q.defer();
420 if (currentUser.authority === 'SYS_ADMIN' || currentUser.authority === 'TENANT_ADMIN') { 435 if (currentUser.authority === 'SYS_ADMIN' || currentUser.authority === 'TENANT_ADMIN') {
@@ -1334,7 +1334,8 @@ @@ -1334,7 +1334,8 @@
1334 "password-link-sent-message": "Password reset link was successfully sent!", 1334 "password-link-sent-message": "Password reset link was successfully sent!",
1335 "email": "Email", 1335 "email": "Email",
1336 "login-with": "Login with {{name}}", 1336 "login-with": "Login with {{name}}",
1337 - "or": "or" 1337 + "or": "or",
  1338 + "error": "Login error"
1338 }, 1339 },
1339 "position": { 1340 "position": {
1340 "top": "Top", 1341 "top": "Top",
@@ -51,7 +51,7 @@ @@ -51,7 +51,7 @@
51 <div class="text mat-typography">{{ "login.or" | translate | uppercase }}</div> 51 <div class="text mat-typography">{{ "login.or" | translate | uppercase }}</div>
52 <div class="line"><md-divider></md-divider></div> 52 <div class="line"><md-divider></md-divider></div>
53 </div> 53 </div>
54 - <md-button ng-repeat="oauth2Client in oauth2Clients" class="md-raised" 54 + <md-button ng-repeat="oauth2Client in oauth2Clients" class="md-raised md-accent md-hue-2"
55 layout="row" layout-align="center center" ng-href="{{ oauth2Client.url }}" target="_self"> 55 layout="row" layout-align="center center" ng-href="{{ oauth2Client.url }}" target="_self">
56 <md-icon class="material-icons md-18" md-svg-icon="{{ oauth2Client.icon }}"></md-icon> 56 <md-icon class="material-icons md-18" md-svg-icon="{{ oauth2Client.icon }}"></md-icon>
57 {{ 'login.login-with' | translate: {name: oauth2Client.name} }} 57 {{ 'login.login-with' | translate: {name: oauth2Client.name} }}
@@ -94,7 +94,7 @@ export default class TbGoogleMap { @@ -94,7 +94,7 @@ export default class TbGoogleMap {
94 window[this.initMapFunctionName] = function() { // eslint-disable-line no-undef, angular/window-service 94 window[this.initMapFunctionName] = function() { // eslint-disable-line no-undef, angular/window-service
95 lazyLoad.load([ // eslint-disable-line no-undef 95 lazyLoad.load([ // eslint-disable-line no-undef
96 { type: 'js', path: 'https://unpkg.com/@google/markerwithlabel@1.2.3/src/markerwithlabel.js' }, 96 { type: 'js', path: 'https://unpkg.com/@google/markerwithlabel@1.2.3/src/markerwithlabel.js' },
97 - { type: 'js', path: 'https://developers.google.com/maps/documentation/javascript/examples/markerclusterer/markerclusterer.js' } 97 + { type: 'js', path: 'https://unpkg.com/@google/markerclustererplus@4.0.1/dist/markerclustererplus.min.js' }
98 ]).then( 98 ]).then(
99 function success() { 99 function success() {
100 gmGlobals.gmApiKeys[tbMap.apiKey].loaded = true; 100 gmGlobals.gmApiKeys[tbMap.apiKey].loaded = true;