client/src/sagas/networkSaga.js
author ymh <ymh.work@gmail.com>
Tue, 27 Jun 2017 11:38:26 +0200
changeset 97 69eaef18b01b
parent 88 2a861fed6bde
child 129 d48946d164c6
permissions -rw-r--r--
Improve the network saga. Try to avoid unnecessary token refresh

import * as types from '../constants/actionTypes';
import { all, call, fork, race, take, cancelled, put, select } from 'redux-saga/effects'
import config from '../config';
import * as persistConstants  from 'redux-persist/constants';
import jwt_decode from 'jwt-decode';
import moment from 'moment';

// Utility function to delay effects
function delay(millis) {
    const promise = new Promise(resolve => {
        setTimeout(() => resolve(true), millis)
    });
    return promise;
}

function pingServer(client, token) {
  const decodedToken = jwt_decode(token);
  const currentTs = moment.now()/1000;

  const timeout = new Promise((resolve, reject) => {
    setTimeout(reject, config.networkStatusTimeout, 'request timed out');
  });

  if((decodedToken.exp-currentTs) < 300) {
    return Promise
      .race([timeout, client.post('/api/auth/refresh/', { token })]);
  } else {
    // We do a GET because a HEAD generate a preflight CORS OPTION request. The GET does not.
    return Promise
      .race([timeout, client.get('/api/auth/user/')]);
  }
}

function* pollData(context) {
  const token = yield select(state => state.token);
  // No token : we wait for a login
  if(!token) {
    yield take(types.AUTH_LOGIN_SUCCESS);
  }
  try {
    const res = yield pingServer(context.client, token);
    yield call(context.callback, true);
    if(res.token) {
      yield put({
        type: types.AUTH_STORE_TOKEN_ASYNC,
        token: res.token,
      });
    }
  } catch (error) {
    yield call(context.callback, false);
    //TODO: This is ugly...
    if ((error.non_field_errors &&
      error.non_field_errors &&
      error.non_field_errors.length &&
      error.non_field_errors.length > 0 &&
      ( error.non_field_errors[0] === 'Signature has expired.' ||
        error.non_field_errors[0] === 'Refresh has expired.' )) ||
      (error.detail && (
        error.detail === 'Signature has expired.' ||
        error.detail=== 'Refresh has expired.'
      ))
    ) {
      yield put({
        type: types.AUTH_DEAUTHENTICATE
      });
    }
  } finally {
    if (yield cancelled()) {
      // pollDate cancelled
      // if there is a token : this was a LOGIN, set status to ok
      // if there is no token : this was a LOGOUT, set status to ko and wait for login
      const token = yield select(state => state.token);
      yield call(context.callback, Boolean(token));
    }
  }
}

function* callDelay(context) {
  try {
    yield call(delay, config.networkStatusInterval);
  } finally {
    if (yield cancelled()) {
      // pollDate cancelled
      // if there is a token : this was a LOGIN, set status to ok
      // if there is no token : this was a LOGOUT, set status to ko and wait for login
      const token = yield select(state => state.token);
      yield call(context.callback, Boolean(token));
    }
  }
}

// Wait for successful response, then fire another request
// Cancel polling if user logs out or log in
function* watchPollData(context) {

  //wait for the state to be rehydrated
  yield take(persistConstants.REHYDRATE);

  while (true) {
    yield race([
      all([call(pollData, context), call(callDelay, context)]),
      take(types.AUTH_LOGOUT),
      take(types.AUTH_LOGIN_SUCCESS)
    ]);
  }
}

// Daemonize tasks in parallel
export default function* root(baseContext) {
  const actionRes = yield take(types.OFFLINE_CONFIG_INITIALIZED);
  const context = {...baseContext, ...actionRes.additionalContext};
  yield all([
    fork(watchPollData, context)
    // other watchers here
  ]);
}