@niledatabase/server 3.0.0-alpha.17 → 3.0.0-alpha.18
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -3113,6 +3113,8 @@ var appRoutes = function appRoutes(prefix) {
|
|
|
3113
3113
|
};
|
|
3114
3114
|
};
|
|
3115
3115
|
|
|
3116
|
+
// url host does not matter, we only match on the 1st leg by path
|
|
3117
|
+
var ORIGIN = 'http://localhost';
|
|
3116
3118
|
/**
|
|
3117
3119
|
* a helper function to log in server side.
|
|
3118
3120
|
*/
|
|
@@ -3120,7 +3122,7 @@ function serverAuth(config, handlers) {
|
|
|
3120
3122
|
var _Logger = Logger(config, '[server side login]'),
|
|
3121
3123
|
info = _Logger.info,
|
|
3122
3124
|
error = _Logger.error;
|
|
3123
|
-
var routes =
|
|
3125
|
+
var routes = appRoutes(config.routePrefix);
|
|
3124
3126
|
return /*#__PURE__*/function () {
|
|
3125
3127
|
var _login = _asyncToGenerator( /*#__PURE__*/_regeneratorRuntime().mark(function _callee(_ref) {
|
|
3126
3128
|
var _providers, _exec;
|
|
@@ -3136,7 +3138,7 @@ function serverAuth(config, handlers) {
|
|
|
3136
3138
|
throw new Error('Server side login requires a user email and password.');
|
|
3137
3139
|
case 3:
|
|
3138
3140
|
info('Obtaining providers for', email);
|
|
3139
|
-
sessionUrl = new URL(routes.PROVIDERS);
|
|
3141
|
+
sessionUrl = new URL("" + ORIGIN + routes.PROVIDERS);
|
|
3140
3142
|
sessionReq = new Request(sessionUrl, {
|
|
3141
3143
|
method: 'GET',
|
|
3142
3144
|
headers: new Headers({
|
|
@@ -3167,7 +3169,7 @@ function serverAuth(config, handlers) {
|
|
|
3167
3169
|
error(_context.t0);
|
|
3168
3170
|
case 21:
|
|
3169
3171
|
info('Obtaining csrf');
|
|
3170
|
-
csrf = new URL(routes.CSRF);
|
|
3172
|
+
csrf = new URL("" + ORIGIN + routes.CSRF);
|
|
3171
3173
|
csrfReq = new Request(csrf, {
|
|
3172
3174
|
method: 'GET',
|
|
3173
3175
|
headers: new Headers({
|
|
@@ -3211,14 +3213,14 @@ function serverAuth(config, handlers) {
|
|
|
3211
3213
|
}
|
|
3212
3214
|
throw new Error('Unable to obtain credential provider. Aborting server side login.');
|
|
3213
3215
|
case 48:
|
|
3214
|
-
signInUrl = new URL(
|
|
3216
|
+
signInUrl = new URL(credentials.callbackUrl);
|
|
3215
3217
|
if (csrfCookie) {
|
|
3216
3218
|
_context.next = 51;
|
|
3217
3219
|
break;
|
|
3218
3220
|
}
|
|
3219
3221
|
throw new Error('Unable to authenticate REST');
|
|
3220
3222
|
case 51:
|
|
3221
|
-
info('Attempting sign in
|
|
3223
|
+
info('Attempting sign in with email', email);
|
|
3222
3224
|
postReq = new Request(signInUrl, {
|
|
3223
3225
|
method: 'POST',
|
|
3224
3226
|
headers: new Headers({
|
|
@@ -3244,11 +3246,17 @@ function serverAuth(config, handlers) {
|
|
|
3244
3246
|
throw new Error('authentication failed');
|
|
3245
3247
|
case 59:
|
|
3246
3248
|
_ref3 = (_exec = /(nile\.session-token=.+?);/.exec(authCookie)) != null ? _exec : [], token = _ref3[1];
|
|
3249
|
+
if (token) {
|
|
3250
|
+
_context.next = 62;
|
|
3251
|
+
break;
|
|
3252
|
+
}
|
|
3253
|
+
throw new Error('Server login failed');
|
|
3254
|
+
case 62:
|
|
3247
3255
|
info('Server login successful', authCookie, csrfCookie);
|
|
3248
3256
|
return _context.abrupt("return", new Headers({
|
|
3249
3257
|
cookie: [token, csrfCookie].join('; ')
|
|
3250
3258
|
}));
|
|
3251
|
-
case
|
|
3259
|
+
case 64:
|
|
3252
3260
|
case "end":
|
|
3253
3261
|
return _context.stop();
|
|
3254
3262
|
}
|